Property
Languagejava
Severitymedium
CWECWE-502: Deserialization of Untrusted Data
OWASPA8:2017 Insecure Deserialization
Confidence LevelMedium
Impact LevelHigh
Likelihood LevelLow

Description#

Enabling default typing in Jackson (e.g., with enableDefaultTyping() or certain @JsonTypeInfo annotations) exposes your application to unsafe deserialization. If user-controlled JSON is processed this way, attackers can craft payloads that instantiate unexpected classes during deserialization.

Impact#

An attacker could exploit this to achieve remote code execution, letting them run arbitrary code on your server. This can lead to full system compromise, data theft, service disruption, or further attacks against your infrastructure.