Detecting Jackson deserialization vulnerabilities with CodeQL
17 views
Skip to first unread message
Artem Smotrakov
unread,
Aug 4, 2021, 10:53:05 AM8/4/21
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to jackson-user
Hi All,
You might have heard about deserialization vulnerabilities. If you use Jackson libraries and run a security scanner, you might have received quite a lot of alerts about deserialization vulnerabilities. Those finding are quite often false alerts because application often use Jackson in a safe way. But sometimes they don't, and deserialization attacks becomes a real threat. Now the real issues in applications can be detected with CodeQL. In case you don’t know, CodeQL is a code analysis engine. I recently updated the java/unsafe-deserialization query to cover Jackson as well