Home / Vulnerability Database / Kotlin : Deserialization of untrusted data
Kotlin

Kotlin : Deserialization of untrusted data

Overview

Deserialization of user-controlled objects can lead to arbitrary code execution on the server.

Deserializing objects from a standard thread is insecure, because an attacker can override the contents and cause the application to execute arbitrary code. Even if you check the types after deserialization, the malicious code can already be executed, since it happens during deserialization.

MEDIUM

DerScanner Severity Score

Do you want to fix Kotlin : Deserialization of untrusted data in your application?

See also

Kotlin

Kotlin : Missing required cryptographic step

Kotlin

Kotlin : Logging into system output

Kotlin

Kotlin : Call of notify() in synchronized block