Tagged articles
1 articles
Page 1 of 1
Java Backend Technology
Java Backend Technology
Jul 16, 2020 · Information Security

How Java Deserialization Enables Remote Code Execution – Exploit Chains and Fixes

This article explains the mechanics of Java deserialization vulnerabilities, demonstrates how malicious payloads can trigger Runtime.exec via Commons‑Collections transformers and AnnotationInvocationHandler, showcases full exploit code, discusses Dubbo‑specific issues, and provides practical mitigation strategies.

Commons-CollectionsDeserializationDubbo
0 likes · 17 min read
How Java Deserialization Enables Remote Code Execution – Exploit Chains and Fixes