An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities

نویسندگان

چکیده

Nowadays, an increasing number of applications uses deserialization. This technique, based on rebuilding the instance objects from serialized byte streams, can be dangerous since it open application to attacks such as remote code execution (RCE) if data deserialize is originating untrusted source. Deserialization vulnerabilities are so critical that they in OWASP's list top 10 security risks for web applications. mainly caused by faults development process and flaws their dependencies, i.e., libraries used these No previous work has studied deserialization in-depth: How performed? weaknesses introduced patched? And how long present codebase? To yield a deeper understanding this important kind vulnerability, we perform two main analyses: one attack gadgets, exploitable pieces code, Java libraries, For first analysis, conduct exploratory large-scale study running 256515 experiments which vary versions each 19 publicly available exploits. Such rely combination gadgets or multiple libraries. A gadget method using fields attacker-controlled. Our goal precisely identify library containing understand have been patched. We observe modification innocent-looking detail class -- making public already introduce gadget. Furthermore, noticed among 37.5% not patched, leaving future attacks. second manually analyze 104 CVEs patched real-life Results indicate always completely workaround solution proposed. With solution, still vulnerable itself unchanged.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobility and Remote-Code Execution

Using an adapted analysis grid, this paper presents a new reading of the concepts underlying the mobile code/agent technology by proposing a decomposition of the paradigms related to remote-code execution into three categories: remote-code calling, remote code-loading and mobile code. Models resulting from this decomposition are specified and implemented using a uniform execution system. A dist...

متن کامل

Algebraic Matching of Vulnerabilities in a Low-Level Code

This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

Remote Code Execution on Ubiquitous Mobile Applications

Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization purposes. This is rather restrictive as, while away from these fixed computers, such mobile devices may require resources that are not available (e.g. network bandwidth, processing power or storage space). This lack of ...

متن کامل

Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study

This paper presents the source code analysis of a file reader server socket program (connection-oriented sockets) developed in Java, to illustrate the identification, impact analysis and solutions to remove five important software security vulnerabilities, which if left unattended could severely impact the server running the software and also the network hosting the server. The five vulnerabili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Software Engineering and Methodology

سال: 2023

ISSN: ['1049-331X', '1557-7392']

DOI: https://doi.org/10.1145/3554732