Java Backend Technology
Jul 16, 2020 · Information Security
How Java Deserialization Enables Remote Code Execution – Exploit Chains and Fixes
This article explains the mechanics of Java deserialization vulnerabilities, demonstrates how malicious payloads can trigger Runtime.exec via Commons‑Collections transformers and AnnotationInvocationHandler, showcases full exploit code, discusses Dubbo‑specific issues, and provides practical mitigation strategies.
Commons-CollectionsDeserializationDubbo
0 likes · 17 min read
