The specific exists in the use of JBoss Interceptors library. By sending a specially crafted request, the application can be made to deseriallze untrusted data during thee handling of the request. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None