Automated Gadget Chain Discovery for Deserialization Vulnerability Remediation

Automated Gadget Chain Discovery for Deserialization Vulnerability Remediation

OWASP Foundation via YouTube Direct link

Deserialization Library Flexibility

12 of 17

12 of 17

Deserialization Library Flexibility

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Automated Gadget Chain Discovery for Deserialization Vulnerability Remediation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Deserialization Gadget Chains
  3. 3 What is a Deserialization Vulnerability? In object oriented languages (like Java), data is contained in classes and classes contain code.
  4. 4 Magic Methods? • readObject() and readResolve() are the main ones...
  5. 5 Magic Methods to Gadget Chains
  6. 6 Example Payload
  7. 7 Finding Vulnerabilities • Finding potential vulnerabilities is similar to finding many application security issues
  8. 8 Remediation Options • Why not use a better serialization strategy? "It's 2016, there are better options." -Luca Carettoni
  9. 9 Finding Exploits
  10. 10 Gadget Inspector • Operates on any given classpath, i.e. a particular library or an entire war • Reports discovered gadget chains as a sequence of method invocations • Performs some simplistic symbol…
  11. 11 How Does It Work?
  12. 12 Deserialization Library Flexibility
  13. 13 New Gadget Chains: Clojure org.clojure clojure 6th most popular maven dependency
  14. 14 New Gadget Chains: Scala
  15. 15 Results: Netflix Internal Webapp 1
  16. 16 Results: Netflix Internal Webapp 2
  17. 17 Final Thoughts • Automatic discovery for gadget chains is new territory

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.