CVE-2026-44088
概要

SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded.

This issue was fixed in version 1.2.1.

公表日 2026年5月15日18:16
登録日 2026年5月17日4:11
最終更新日 2026年5月15日23:56
関連情報、対策とツール
共通脆弱性一覧