OWASP Foundation
owasp.org › www-community › vulnerabilities › Insecure_Deserialization
Insecure Deserialization | OWASP Foundation
Insecure Deserialization is a type of vulnerability that arises when untrusted data is used to abuse the logic of an application’s deserialization process, allowing an attacker to execute code, manipulate objects, or perform injection attacks.
OWASP
owasp.org › www-project-top-ten › 2017 › A8_2017-Insecure_Deserialization
OWASP Top Ten 2017 | A8:2017-Insecure Deserialization | OWASP Foundation
A8:2017-Insecure Deserialization on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
Did I Waste Time Starting in Full Stack Before Cybersecurity?
No, you didn't waste your time - it's generally a good idea to know and understand IT and Programming before stepping into a cyber role, and will definitely help with things like AppSec, white box pentesting, etc. More on reddit.com
I'm not sure what tool I can even use for my assignment?
Try SQLMap for sql injection through the command line. Lots of tutorials online will actually use Juice Shop to demonstrate SQLMap. More on reddit.com
Videos
01:17:21
OWASP Toronto | The Current State of Insecure Deserialization ...
19:07
Insecure Deserialization For Beginners - YouTube
12:04
OWASP insecure deserialization explained with examples - YouTube
10:49
How Hackers Hack using Cookies??|| what is Insecure Deserialization ...
OWASP TOP 10 insecure deserialization - Explained with ...
11:34
OWASP Top 10: Insecure Deserialization - YouTube
OWASP Cheat Sheet Series
cheatsheetseries.owasp.org › cheatsheets › Deserialization_Cheat_Sheet.html
Deserialization - OWASP Cheat Sheet Series
var suspectObject = myBinaryFormatter.Deserialize(untrustedData); //Check below is too late! Execution may have already occurred. if (suspectObject is SomeDangerousObjectType) { //generate warnings and dispose of suspectObject } For JSON.Net it is possible to create a safer form of allow-list control using a custom SerializationBinder. Try to keep up-to-date on known .Net insecure deserialization gadgets and pay special attention where such types can be created by your deserialization processes.
OWASP Foundation
owasp.org › www-community › vulnerabilities › Deserialization_of_untrusted_data
Deserialization of untrusted data | OWASP Foundation
The following is an example from Adobe’s BlazeDS AMF deserialization vulnerability (CVE-2011-2092). You can specify arbitrary classes and properties for a BlazeDS application to deserialize. This particular payload creates an instance of a JFrame object on the target server.
GitHub
github.com › OWASP › Serverless-Top-10-Project › blob › master › 2018 › en › 0xS8-insecure-deserialization.md
Serverless-Top-10-Project/2018/en/0xS8-insecure-deserialization.md at master · OWASP/Serverless-Top-10-Project
As usual, the business impact depends on the application and the data it handles. Insecure deserialization usually results in running arbitrary code that could eventually lead to data leakage and, in severe cases, even resource and account control.
Author OWASP
Veracode
docs.veracode.com › manage risk › review findings › resolve findings › prevent general attacks › prevent insecure deserialization attacks
Prevent insecure deserialization attacks | Veracode Docs
4 weeks ago - Insecure deserialization has been ranked as #8 on the OWASP Top Ten List of web applications most critical security risks since 2017, along with other risks such as an injection vulnerability.
Wallarm
wallarm.com › what › a8-insecure-deserialization-2017-owasp
A8: Insecure Deserialization ❗️ - Top 10 OWASP 2017
April 8, 2025 - Insecure serialization has historically been seen as a super hard to grasp vulnerability, almost like a black box but while it does contain it’s challenges, so does every other issue type on the OWASP top 10. serialization is a technique used to convert an object into a byte stream for it to be stored somewhere or passed on to another system. As these serialized objects undergo deserialization, dangerous issues might arise.
Owasp-juice
help.owasp-juice.shop › part2 › insecure-deserialization.html
Insecure Deserialization · Pwning OWASP Juice Shop
These native formats usually offer more features than JSON or XML, including customizability of the serialization process. Unfortunately, the features of these native deserialization mechanisms can be repurposed for malicious effect when operating on untrusted data.
GitHub
github.com › OWASP › Top10 › blob › master › 2017 › en › 0xa8-insecure-deserialization.md
Top10/2017/en/0xa8-insecure-deserialization.md at master · OWASP/Top10
Object and data structure related attacks where the attacker modifies application logic or achieves arbitrary remote code execution if there are classes available to the application that can change behavior during or after deserialization.
Author OWASP
Kiuwan
kiuwan.com › blog › owasp-top-10-2017-a8-insecure-deserialization
OWASP Top 10 2017: A8 Insecure Deserialization | Kiuwan
July 23, 2024 - In 2017, OWASP added a new vulnerability to the Top 10 list: A8 Insecure Deserialization, in place of the previous #8 vulnerability, Cross-Site Request Forgery.
PortSwigger
portswigger.net › web-security › deserialization
Insecure deserialization | Web Security Academy
In short, it can be argued that it is not possible to securely deserialize untrusted input. The impact of insecure deserialization can be very severe because it provides an entry point to a massively increased attack surface.
PVS-Studio
pvs-studio.com › en › docs › warnings › v5611
V5611. OWASP. Potential insecure deserialization vulnerability. Potentially tainted data is used to create an object using deserialization.
July 7, 2021 - The intruder will not be able to get higher privileges by changing the value of the 'isAdmin' property in the file. This will fix the problem of unsecure deserialization in the described example. For more robust protection against this type of vulnerabilities, follow a few more rules, listed in the relevant OWASP Top 10 section.
The Hackerish
thehackerish.com › home › insecure deserialization explained with examples
Insecure Deserialization explained with examples - thehackerish
April 22, 2021 - In this section, we will explore many known CVEs which exploited this vulnerability. Some of them are insecure deserialization bug bounty reports from Hackerone. How to exploit it? This is where you will learn to go beyond running tools. You will perform white box testing and build custom code to solve a challenge on OWASP WebGoat.
OWASP
mas.owasp.org › MASWE-0088
MASWE-0088: Insecure Object Deserialization
You're being redirected to a new destination
DevCentral
community.f5.com › kb › technicalarticles › lightboard-lessons-owasp-top-10---insecure-deserialization › 281509
Lightboard Lessons: OWASP Top 10 - Insecure Deserialization
A community of F5 experts collaborating to solve challenges, share ideas, and discuss industry trends.