The document provides a summary of Java deserialization vulnerabilities, including:
- An 2013 vulnerability in JBoss RichFaces allowed remote code execution via insecure deserialization. This allowed attackers to trigger execution of any deserializable class.
- The 2013 Apache Commons FileUpload vulnerability allowed arbitrary file upload via a poison null byte attack during deserialization that wrote files to the system.
- Later vulnerabilities used "property-oriented programming" gadgets and chains of deserializable classes and methods to achieve remote code execution during deserialization.
- The 2021 Log4Shell vulnerability allowed remote code execution by configuring logging in Log4j version 2.0-2.12.1 and 2.13-2.14.1
Related topics: