Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-23636
HistoryJan 23, 2024 - 5:22 p.m.

CVE-2024-23636 SOFARPC Remote Command Execution(RCE) Vulnerbility

2024-01-2317:22:52
CWE-502
GitHub_M
www.cve.org
cve-2024-23636
sofarpc
remote command execution
vulnerability
java rpc framework
sofa hessian
deserialization
gadget chain
blacklist
security protection
version 5.12.0
rpc_serialize_blacklist_override

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%

SOFARPC is a Java RPC framework. SOFARPC defaults to using the SOFA Hessian protocol to deserialize received data, while the SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But, prior to version 5.12.0, there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. Version 5.12.0 fixed this issue by adding a blacklist. SOFARPC also provides a way to add additional blacklists. Users can add a class like -Drpc_serialize_blacklist_override=org.apache.xpath. to avoid this issue.

CNA Affected

[
  {
    "vendor": "sofastack",
    "product": "sofa-rpc",
    "versions": [
      {
        "version": "< 5.12.0",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.1%

Related for CVELIST:CVE-2024-23636