ObjectInputStream

Bookmarked!

This exercise covers the exploitation of a call to readObject in a Spring application

PRO Medium < 1 Hr. 4358 Serialize Badge
Course
Make sure you give at least 1024MB of RAM to this VM!

This course focuses on exploiting a Java serialization vulnerability in a Spring application, where user-controlled data is unserialized using the <code>readObject()</code> method. This can lead to unexpected behaviors and even remote code execution.

Skills covered
Injection Operating System
Included with PRO
Full course content 1 video Common mistakes

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.