Lightboard Lessons: OWASP Top 10 - Insecure Deserialization
The OWASP Top 10 is a list of the most common security risks on the Internet today. Insecure Deserialization comes in at the #8 spot in the latest edition of the OWASP Top 10. In this video, John d...
Updated May 10, 2022
Version 2.0ltwagnon
Ret. Employee
Joined May 15, 2019
ltwagnon
Ret. Employee
Joined May 15, 2019
JRahm
Admin
Joined January 20, 2005
ltwagnon
Apr 20, 2018Ret. Employee
Hi sachin...great question! The ASM handles Insecure Deserialization mostly through attack signatures. So, it should catch these attempts as a normal part of the way it functions no matter which type of policy you create. Just make sure the standard attack signatures are enabled (which they are by default on any policy). A few examples of signatures that catch Insecure Deserialization attempts are:
- 200004188 PHP object serialization injection attempt (Parameter)
- 200003425 Java Base64 serialized object - java/lang/Runtime (Parameter)
- 200004282 Node.js Serialized Object Remote Code Execution (Parameter)
Hope this helps!