Published November 29, 2019 | Version v1
Preprint Open

[Preprint] ObjectMap: Detecting Insecure Object Deserialization

Description

In recent years there is a surge of serialization-based vulnerabilities in web applications which have led to serious incidents, exposing private data of millions of individuals. Although there have been some efforts in addressing this problem, there is still no unified solution that is able to detect implementation-agnostic vulnerabilities. We aim to fill this gap by proposing ObjectMap, an extendable tool for the detection of deserialization and object injection vulnerabilities in Java and PHP based web applications. Furthermore, we also introduce the first deserialization test environment which can be used to test deserialization vulnerability detection tools and for educational purposes. Both of these tools are easily extendable and the first to implement this combination of features to the best of our knowledge and they bring together a synthesis of cross-complementing functionalities that are able to ignite further research in the field and help in the development of more feature-rich solutions.

Notes

This work was supported by the European Commission, under the FutureTPM, CUREX, INCOGNITO and SECONDO projects; Grant Agreements no. 779391, 826404, 824015 and 823997, respectively.

Files

25-ObjectMap Detecting Insecure Object Deserialization.pdf

Files (515.6 kB)

Additional details

Funding

INCOGNITO – IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services 824015
European Commission
CUREX – seCUre and pRivate hEalth data eXchange 826404
European Commission
SECONDO – a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era 823997
European Commission
FutureTPM – Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module 779391
European Commission