A8:2021 | Software and Data Integrity | Insecure Deserialization (3) | Cycubix Doc
The Simplest Exploit
Vulnerable code
The following is a well-known example for a Java Deserialization vulnerability.
It is expecting an AcmeObject
object, but it will execute readObject()
before the casting occurs. If an attacker finds the proper class implementing dangerous operations in readObject()
, he could serialize that object and force the vulnerable application to perform those actions.
Class included in ClassPath
Attackers need to find a class in the classpath that supports serialization and with dangerous implementations on readObject()
.
Exploit
If the java class shown above exists, attackers can serialize that object and obtain Remote Code Execution.
PreviousA8:2021 | Software and Data Integrity | Insecure Deserialization (2) | Cycubix DocNextA8:2021 | Software and Data Integrity | Insecure Deserialization (4) | Cycubix Doc
Last updated