Deserialization Attack
Description
Deserialization attacks occur when untrusted data is used to construct objects, potentially leading to remote code execution, denial of service, or other malicious actions. Example: Deserializing a crafted payload that includes malicious code to be executed upon deserialization.
Remediation
To prevent deserialization vulnerabilities, take the following actions:
- Avoid deserializing untrusted data whenever possible.
- Use safe deserialization libraries that parovide security features.
- Implement strict input validation and sanitization to ensure that only trusted data is deserialized.
- Use whitelisting techniques to restrict the types of objects that can be deserialized.
- Apply security controls such as application-level sandboxing to limit the impact of a potential deserialization attack.
REST Specific
Spring_boot
Django
Flask
Nodejs
Ruby_on_rails
Laravel
Express_js
Symfony
Nuxt
Fastapi
Configuration
Identifier:
injection/deserialization_attack
Examples
Ignore this check
checks:
injection/deserialization_attack:
skip: true
Score
- Escape Severity: HIGH
Compliance
OWASP: API10:2023
pci: 6.5.2
gdpr: Article-32
soc2: CC6
iso27001: A.14.2
nist: SP800-53
fedramp: SI-10
Classification
- CWE: 502
Score
- CVSS_VECTOR: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
- CVSS_SCORE: 9.8