Java Object Deserialization

critical Web Application Scanning Plugin ID 98780


Java Object Deserialization


Serialization is the process of converting an object to a stream of bytes, in order to store or send it through the network. By opposition, deserialization is the process of reconstructing an object from this stream of bytes.

When an application performs untrusted data deserialization, an attacker could inject a custom serialized Java object to trigger malicious code execution on the system or to generate a Denial of Service attack (DoS).

It was determined that the target Java application is vulnerable to this attack as it deserializes an user-supplied object.


Untrusted data should never be deserialized by the application. If required, a code review should be done to prevent deserialization of arbitrary classes and to harden the whole process.

See Also

Plugin Details

Severity: Critical

ID: 98780

Type: remote

Published: 10/7/2020

Updated: 11/26/2021

Scan Template: api, scan, pci

Risk Information


Risk Factor: High

Base Score: 7.6

Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: Tenable


Risk Factor: Critical

Base Score: 9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS Score Source: Tenable

Vulnerability Information

Exploit Available: true

Patch Publication Date: 1/2/2020

Vulnerability Publication Date: 1/1/2017

Reference Information