Injection Flaws - Deserialisation of Untrusted Data
When deserializing the XML file containing article data without performing any verification to ensure it does not contain malicious data, an adversary could inject a crafted XML file to abuse application logic, deny service, or execute arbitrary code.
The application is only deserializing XML data that was previously encrypted with a known secret key. If malicious content is uploaded by an attacker, the application will throw an error as the data is not properly encrypted. In this way, no untrusted data will be deserialized.
Comments
Post a Comment