Description
It was determined that your web application is performing Java object deserialization of user-supplied data. Arbitrary object deserialization is inherently unsafe, and should never be performed on untrusted data. Consult Web references section for more information about this issue.
Remediation
Java object deserialization should not be performed on user-supplied data.
References
AppSecCali 2015 - Marshalling Pickles
What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common?
Related Vulnerabilities
WordPress Plugin Image Gallery with Slideshow 'upload-file.php' Arbitrary File Upload (1.5)
WordPress Plugin Appointment Booking Calendar CSV Injection (1.3.34)
WordPress Plugin IGIT Posts Slider Widget TimThumb Arbitrary File Upload (1.1)
WordPress Plugin Category Grid View Gallery TimThumb Arbitrary File Upload (0.1.1)