Implementation: Validate object before deserialization process
Design: Limit which types can be deserialized.
Implementation: Avoid having unnecessary types or gadgets available that can be leveraged for malicious ends. Use an allowlist of acceptable classes.
Implementation: Keep session state on the server, when possible.
Weakness Name | |
---|---|
CWE-502 |
Deserialization of Untrusted Data The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated References, Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Mitigations | |
CAPEC Content Team | The MITRE Corporation | Updated Mitigations |