Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Highlighted
Super Contributor.. ellerm Super Contributor..
Super Contributor..
3355 views

Dynamic Code Evaluation: Unsafe Deserialization

Fortify identifies a Dynamic Code Evaluation: Unsafe Deserialization vulnerability when the following is identified in a pom.xml

<dependency>
    <groupId>org.springframework.boot</groupId>
    <artifactId>spring-boot-starter-actuator</artifactId>
</dependency>

Does anyone know why this declaration would lead to the vulnerability?

Labels (1)
Tags (3)
0 Likes
2 Replies
Super Contributor.. eelgheez Super Contributor..
Super Contributor..

Re: Dynamic Code Evaluation: Unsafe Deserialization

I guess Fortify tries on a component analysis hat here.  The library creates unauthenticated JMX endpoints.  The Java deserialization attack involves sending a serialized data of a Java class whose instantiation will execute actions controlled by the data. 

That is, if a widely used class org.company.fileops.FileWriter deletes a file submitted to it as an argument in its constructor FileWriter(String fileName), sending a serialization of FileWriter with an important file path in it and the server's deserializing it will result in deleting that file on the server.  This works regardless of the class expected by the recipient (the ois.readObject() caller) that will throw a class cast exception only after the received data are turned into a FileWriter instance.

 

Super Contributor.. ellerm Super Contributor..
Super Contributor..

Re: Dynamic Code Evaluation: Unsafe Deserialization

This makes perfect sense.  Thanks for the feedback.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.