Dettaglio CAPEC-586

CAPEC-586

Object Injection
Medio
Alto
Draft
2017-02-06
00h00 +00:00
2020-12-17
00h00 +00:00
Avviso per un CAPEC specifico
Rimani informato su qualsiasi modifica relativa a un CAPEC specifico.
Gestione notifiche

Descrizioni CAPEC

An adversary attempts to exploit an application by injecting additional, malicious content during its processing of serialized objects. Developers leverage serialization in order to convert data or state into a static, binary format for saving to disk or transferring over a network. These objects are then deserialized when needed to recover the data/state. By injecting a malformed object into a vulnerable application, an adversary can potentially compromise the application by manipulating the deserialization process. This can result in a number of unwanted outcomes, including remote code execution.

Informazioni CAPEC

Prerequisiti

The target application must unserialize data before validation.

Mitigazioni

Vulnerabilità correlate

CWE-ID Nome della vulnerabilità

CWE-502

Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

Riferimenti

REF-468

Deserialization of Untrusted Data

Invio

Nome Organizzazione Data Data di rilascio
CAPEC Content Team The MITRE Corporation 2017-02-06 +00:00

Modifiche

Nome Organizzazione Data Commento
CAPEC Content Team The MITRE Corporation 2018-07-31 +00:00 Updated References, Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated Mitigations
CAPEC Content Team The MITRE Corporation 2020-12-17 +00:00 Updated Mitigations