OWASP A08:2021 - Software and Data Integrity Failures
Overview
Common Attack Scenarios
1. Supply Chain Attacks
2. Insecure Deserialization
3. CI/CD Pipeline Compromise
4. Auto-Update Mechanisms
Technical Details
Insecure Deserialization Vulnerabilities
Supply Chain Indicators
Detection Methods
Static Analysis
Dynamic Testing
Manual Testing Techniques
Common Vulnerable Patterns
Missing Integrity Checks
Insecure Deserialization Endpoints
Weak CI/CD Security
Exploitation Techniques
Java Deserialization with ysoserial
PHP Object Injection
Python Pickle RCE
Mitigation Strategies
1. Implement Integrity Verification
2. Secure Deserialization Practices
3. Supply Chain Security
4. CI/CD Pipeline Hardening
Detection Tools
Open Source
Commercial
Testing Checklist
Pre-Assessment
During Testing
Post-Assessment
Remediation Priority
Additional Resources
PreviousOWASP A07:2021 - Identification and Authentication FailuresNextOWASP A09:2021 - Security Logging and Monitoring Failures
Last updated