King of Tampering II
An attacker can load code inside your process via an extension point:
Threat |
|
You’re using object deserialization in Java without verifying the source or ensuring that the content is of the expected type before deserializing it. As a consequence, your system can inadvertently be runtime-loading executable code. |
|
CAPEC |
CAPEC-548: Contaminate Resource CAPEC-242: Code Injection |
ASVS |
5.5.3 – Ensure you are only allowing deserialization of objects you are allow listing |
CWE |
CWE-502: Deserialization of Untrusted Data |
Mitigations |
|
|