SYM_JAVA_0055 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Deserialization of Untrusted Data

Property Value
Language java
Severity medium
CWE CWE-502: Deserialization of Untrusted Data
OWASP A8:2017 Insecure Deserialization
Confidence Level Medium
Impact Level High
Likelihood Level Low

Description

Enabling default typing in Jackson (e.g., with enableDefaultTyping() or certain @JsonTypeInfo annotations) exposes your application to unsafe deserialization. If user-controlled JSON is processed this way, attackers can craft payloads that instantiate unexpected classes during deserialization.

Impact

An attacker could exploit this to achieve remote code execution, letting them run arbitrary code on your server. This can lead to full system compromise, data theft, service disruption, or further attacks against your infrastructure.