Detecting Jackson deserialization vulnerabilities with CodeQL

17 views
Skip to first unread message

Artem Smotrakov

unread,
Aug 4, 2021, 10:53:05 AM8/4/21
to jackson-user
Hi All,

You might have heard about deserialization vulnerabilities. If you use Jackson libraries and run a security scanner, you might have received quite a lot of alerts about deserialization vulnerabilities. Those finding are quite often false alerts because application often use Jackson in a safe way. But sometimes they don't, and deserialization attacks becomes a real threat. Now the real issues in applications can be detected with CodeQL. In case you don’t know, CodeQL is a code analysis engine. I recently updated the java/unsafe-deserialization query to cover Jackson as well


The query checks the conditions for unsafe deserialization that Tatu described earlier


I also wrote a short blog post about the query


Artem

Tatu Saloranta

unread,
Aug 11, 2021, 6:55:27 PM8/11/21
to jackson-user
Thank you for sharing this! This looks very interesting,

-+ Tatu +-

>
> --
> You received this message because you are subscribed to the Google Groups "jackson-user" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to jackson-user...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/jackson-user/2e60fbb4-746b-42e1-8f68-c3f6de4067abn%40googlegroups.com.
Reply all
Reply to author
Forward
0 new messages