Description
SzafirHost verifies the signature of the downloaded JAR file using class JarInputStream (reading from the beginning of the file), but loads classes using class JarFile/URLClassLoader (reading the Central Directory from the end). It can lead to remote code execution by allowing an attacker to combine a genuine, signed JAR file with a malicious ZIP file, causing the verification to pass but the malicious class to be loaded. This issue was fixed in version 1.2.1.
Problem types
CWE-434 Unrestricted Upload of File with Dangerous Type
Product status
Any version before 1.2.1
Credits
Mariusz Maik
References
cert.pl/posts/2026/05/CVE-2026-44088
www.elektronicznypodpis.pl/