<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://bumjunrh.kr/</id><title>kwakbumjun</title><subtitle>just a blog</subtitle> <updated>2026-04-19T05:55:07+09:00</updated> <author> <name>kwakbumjun</name> <uri>https://bumjunrh.kr/</uri> </author><link rel="self" type="application/atom+xml" href="https://bumjunrh.kr/feed.xml"/><link rel="alternate" type="text/html" hreflang="ko" href="https://bumjunrh.kr/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 kwakbumjun </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Finding Gadgets Like It's 2026: Auto-Trigger Deserialization Gadget Chain on JDK 17/21/25 and Spring Boot 3.2.x-4.0.5(KOR)</title><link href="https://bumjunrh.kr/posts/finding-gadgets-like-its-2026/" rel="alternate" type="text/html" title="Finding Gadgets Like It&amp;apos;s 2026: Auto-Trigger Deserialization Gadget Chain on JDK 17/21/25 and Spring Boot 3.2.x-4.0.5(KOR)" /><published>2026-04-19T10:00:00+09:00</published> <updated>2026-04-19T10:00:00+09:00</updated> <id>https://bumjunrh.kr/posts/finding-gadgets-like-its-2026/</id> <content type="text/html" src="https://bumjunrh.kr/posts/finding-gadgets-like-its-2026/" /> <author> <name>kwakbumjun</name> </author> <category term="Research" /> <summary>Victims Code 해당 체인은 타겟 서버에 아래와 같은 역직렬화 로직이 있다고 가정한다. new ObjectInputStream(input).readObject(); 타겟 서버에서 이 한 줄이 실행되는 순간, 우리가 만든 Java 직렬화 바이트 스트림이 객체 그래프로 복원되기 시작한다. 우리는 이미 이 input에 미리 조작한 HashMap 기반 payload를 넣어둔다. Java 직렬화 바이트스트림에는 객체의 클래스 디스크립터가 포함되어 있다. victim이 ObjectInputStream.readObject()를 호출하면 ObjectInputStream은 스트림을 읽으면서 지금 복원해야 할 객체가 java.util.HashMap이라고 판단하고 그 클래스의 역직렬화 경로를 따라간다. ...</summary> </entry> <entry><title>Finding Gadgets Like It's 2026: Auto-Trigger Deserialization Gadget Chain on JDK 17/21/25 and Spring Boot 3.2.x-4.0.5(EN)</title><link href="https://bumjunrh.kr/posts/finding-gadgets-like-its-2026-en/" rel="alternate" type="text/html" title="Finding Gadgets Like It&amp;apos;s 2026: Auto-Trigger Deserialization Gadget Chain on JDK 17/21/25 and Spring Boot 3.2.x-4.0.5(EN)" /><published>2026-04-19T10:00:00+09:00</published> <updated>2026-04-19T10:00:00+09:00</updated> <id>https://bumjunrh.kr/posts/finding-gadgets-like-its-2026-en/</id> <content type="text/html" src="https://bumjunrh.kr/posts/finding-gadgets-like-its-2026-en/" /> <author> <name>kwakbumjun</name> </author> <category term="Research" /> <summary>Victim Code This chain assumes that the target server contains the following deserialization logic: new ObjectInputStream(input).readObject(); The moment this single line executes on the target server, the Java serialization byte stream we prepared begins to be reconstructed into an object graph. We place a pre-crafted HashMap-based payload into input ahead of time. Java serialization byte...</summary> </entry> </feed>
