AWAE - OSWE Preparation / Resources
  • TL;DR
  • General
    • Resources
      • BurpSuite
      • WhiteBox
    • POCs
      • Deserialization
        • PHP
        • Java
          • Ysoserial
      • SQL Injection
      • Type Juggling
      • CSRF
  • By Vulnerability
    • SQL Injection
      • Summary
      • Types
      • Injection by clause
      • Bypassing Character Restrictions
      • By Language
        • JAVA
          • Regex
          • Summary
      • Regex
      • Resources
    • Deserialization
      • By Language
        • PHP
          • Regex
          • Summary
          • Practice
        • JAVA
          • Regex
          • Summary
          • Practice
          • Resources
        • .NET
          • Regex
          • Summary
          • Resources
      • Resources
    • XSS
    • XXE
      • By Language
        • PHP
          • Practice
          • Resources
        • Java
          • Vulnerable Libraries' Implementation
      • Resources
    • SSTI
      • Summary
      • Practice
      • Resources
    • File Upload Restrictions Bypass
      • Tricks
      • File Extension Filters Bypass List
      • Resources
  • REGEX
  • By Language
    • PHP
      • Regex
      • Type Juggling
        • Summary
        • Practice
    • Java
      • Decompiling
      • Compiling & Running
    • NodeJS
      • Practice
  • Random
  • Other Repositories
Powered by GitBook
On this page

Was this helpful?

  1. By Vulnerability
  2. Deserialization
  3. By Language
  4. JAVA

Regex

Regex to match a set of functions/classes potentially vulnerable to deserialization.

(.*readObject\(.*|java.beans.XMLDecoder|com.thoughtworks.xstream.XStream|.*\.fromXML\(.*\)|com.esotericsoftware.kryo.io.Input|.readClassAndObject\(.*|.readObjectOrNull\(.*|com.caucho.hessian.io|com.caucho.burlap.io.BurlapInput|com.caucho.burlap.io.BurlapOutput|org.codehaus.castor|Unmarshaller|jsonToJava\(.*|JsonObjectsToJava\/.*|JsonReader|ObjectMapper\(|enableDefaultTyping\(\s*\)|@JsonTypeInfo\(|readValue\(.*\,\s*Object\.class|com.alibaba.fastjson.JSON|JSON.parseObject|com.owlike.genson.Genson|useRuntimeType|genson.deserialize|org.red5.io|deserialize\(.*\,\s*Object\.class|\.Yaml|\.load\(.*|\.loadType\(.*\,\s*Object\.class|YamlReader|com.esotericsoftware.yamlbeans)

List

  • .*readObject\(.*

  • java.beans.XMLDecoder

  • com.thoughtworks.xstream.XStream

  • .*\.fromXML\(.*\)

  • com.esotericsoftware.kryo.io.Input

  • .readClassAndObject\(.*

  • .readObjectOrNull\(.*

  • com.caucho.hessian.io

  • com.caucho.burlap.io.BurlapInput

  • com.caucho.burlap.io.BurlapOutput

  • org.codehaus.castor

  • Unmarshaller

  • jsonToJava\(.*

  • JsonObjectsToJava\/.*

  • JsonReader

  • ObjectMapper\(

  • enableDefaultTyping\(\s*\)

  • @JsonTypeInfo\(

  • readValue\(.*\,\s*Object\.class

  • com.alibaba.fastjson.JSON

  • JSON.parseObject

  • com.owlike.genson.Genson

  • useRuntimeType

  • genson.deserialize

  • org.red5.io

  • deserialize\(.*\,\s*Object\.class

  • \.Yaml

  • \.load\(.*

  • \.loadType\(.*\,\s*Object\.class

  • YamlReader

  • com.esotericsoftware.yamlbeans

PreviousJAVANextSummary

Last updated 4 years ago

Was this helpful?