I believe this question is incorrect.
Good question for this CVE: is a collection of apache collections in the classpath? (more specifically InvokerTransformer)
If so, the application is permanently vulnerable if it immediately deserializes objects from any unsafe sources.
If the answer is no, the application is not vulnerable to the Invokertransformer CVE, but is still potentially vulnerable to other types of hacks if it still deserializes objects from untrusted sources without proper checks.
The problem is mainly related to the possibilities of serialization and deserialization ... Thus, InvokerTransformer is only the visible part of the iceberg of dangerous methods. Although, this is one big and simple hit.
Deserializing objects when the serialized version is not under control means unpacking the magic boxes .
source share