An In-depth Study of Java']Java Deserialization Remote-Code Execution Exploits and Vulnerabilities

被引:4
作者
Sayar, Imen [1 ]
Bartel, Alexandre [2 ]
Bodden, Eric [3 ]
Le Traon, Yves [4 ]
机构
[1] Univ Toulouse, IRIT, IUT Blagnac Toulouse II, 1 Pl Georges Brassens, F-31703 Blagnac, France
[2] Umea Univ, MIT Huset, Dept Comp Sci, S-90187 Umea, Sweden
[3] Paderborn Univ, Heinz Nixdorf Inst, Furstenallee 11, D-33102 Paderborn, Germany
[4] Univ Luxembourg, SnT, 6 Rue Richard Coudenhove Kalergi,Kirchberg Campus, L-1359 Luxembourg, Luxembourg
关键词
Serialization; deserialization; vulnerabilities; gadget; remote code execution RCE;
D O I
10.1145/3554732
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, an increasing number of applications use deserialization. This technique, based on rebuilding the instance of objects from serialized byte streams, can be dangerous since it can open the application to attacks such as remote code execution (RCE) if the data to deserialize is originating from an untrusted source. Deserialization vulnerabilities are so critical that they are in OWASP's list of top 10 security risks for web applications. This is mainly caused by faults in the development process of applications and by flaws in their dependencies, i.e., flaws in the libraries used by these applications. No previous work has studied deserialization attacks in-depth: Howare they performed? Howareweaknesses introduced and patched? And for how long are vulnerabilities present in the codebase? To yield a deeper understanding of this important kind of vulnerability, we perform two main analyses: one on attack gadgets, i.e., exploitable pieces of code, present in Java libraries, and one on vulnerabilities present in Java applications. For the first analysis, we conduct an exploratory large-scale study by running 256 515 experiments in which we vary the versions of libraries for each of the 19 publicly available exploits. Such attacks rely on a combination of gadgets present in one or multiple Java libraries. A gadget is a method which is using objects or fields that can be attackercontrolled. Our goal is to precisely identify library versions containing gadgets and to understand howgadgets have been introduced and how they have been patched. We observe that the modification of one innocentlooking detail in a class - such asmaking it public - can already introduce a gadget. Furthermore, we noticed that among the studied libraries, 37.5% are not patched, leaving gadgets available for future attacks. For the second analysis, we manually analyze 104 deserialization vulnerabilities CVEs to understand how vulnerabilities are introduced and patched in real-life Java applications. Results indicate that the vulnerabilities are not always completely patched or that a workaround solution is proposed. With a workaround solution, applications are still vulnerable since the code itself is unchanged.
引用
收藏
页数:45
相关论文
共 69 条
  • [1] The Tip of the Iceberg: On the Merits of Finding Security Bugs
    Alexopoulos, Nikolaos
    Habib, Sheikh Mahbub
    Schulz, Steffen
    Muehlhaeuser, Max
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (01)
  • [2] [Anonymous], 2016, The Guardian
  • [3] [Anonymous], Glossary
  • [4] Saner: Composing static and dynamic analysis to validate sanitization in web applications
    Balzarotti, Davide
    Cova, Marco
    Felmetsger, Vika
    Jovanovic, Nenad
    Kirda, Engin
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 387 - +
  • [5] MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks
    Bartel, Alexandre
    Klein, Jacques
    Le Traon, Yves
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2167 - 2178
  • [6] Blazquez Daniel, 2020, INSECURE DESERIALIZA
  • [7] Bloor Nicky, DESERLAB
  • [8] Bloor Nicky, SERIALIZATIONDUMPER
  • [9] Bonnaventure William, 2021, 2021 IEEE INT C SOFT
  • [10] Broujerdi Hooman, 2018, JDK APPROACH ADDRESS