BAEL-4946 added in code for java deserialization vulnerabilities article
This commit is contained in:
parent
8b115f4c8a
commit
ab5b85c81c
|
@ -1,6 +1,7 @@
|
||||||
package com.baeldung.deserialization.vulnerabilities;
|
package com.baeldung.deserialization.vulnerabilities;
|
||||||
|
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
import org.junit.jupiter.api.DisplayName;
|
||||||
|
|
||||||
import java.io.ByteArrayInputStream;
|
import java.io.ByteArrayInputStream;
|
||||||
import java.io.ByteArrayOutputStream;
|
import java.io.ByteArrayOutputStream;
|
||||||
|
@ -11,6 +12,7 @@ import java.io.ObjectOutputStream;
|
||||||
public class BadThingTest {
|
public class BadThingTest {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
@DisplayName("When a BadThing object is deserialized, then code execution in MyCustomAttackObject is run.")
|
||||||
public void testCodeExecution() throws Exception {
|
public void testCodeExecution() throws Exception {
|
||||||
BadThing bt = new BadThing();
|
BadThing bt = new BadThing();
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue