Injection Flaws - Deserialisation of Untrusted Data

 







When deserializing the XML file containing article data without performing any verification to ensure it does not contain malicious data, an adversary could inject a crafted XML file to abuse application logic, deny service, or execute arbitrary code.

The application is only deserializing XML data that was previously encrypted with a known secret key. If malicious content is uploaded by an attacker, the application will throw an error as the data is not properly encrypted. In this way, no untrusted data will be deserialized.




Comments

Popular posts from this blog

Microservices and Service-Oriented Architecture

Version control and Continuous Integration/Continuous Deployment (CI/CD)

Delegates