CWE-594 - J2EE Framework: Saving Unserializable Objects to Disk
CWE-594
- Abstraction:
- Variant
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
J2EE Framework: Saving Unserializable Objects to Disk
- Description
When the J2EE container attempts to write unserializable objects to disk there is no guarantee that the process will complete successfully.
In heavy load conditions, most J2EE application frameworks flush objects to disk to manage memory requirements of incoming requests. For example, session scoped objects, and even application scoped objects, are written to disk when required. While these application frameworks do the real work of writing objects to disk, they do not enforce that those objects be serializable, thus leaving the web application vulnerable to crashes induced by serialization failure. An attacker may be able to mount a denial of service attack by sending enough requests to the server to force the web application to save objects to disk.
- Common Consequences
Scope: Integrity
Impact: Modify Application Data
Notes: Data represented by unserializable objects can be corrupted.
Scope: Availability
Impact: DoS: Crash, Exit, or Restart
Notes: Non-serializability of objects can lead to system crash.
- Related Weaknesses
- Release Date:
- 2006-12-15
- Latest Modification Date:
- 2024-02-29
Free security scan for your website