Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-46983
HistorySep 19, 2024 - 10:47 p.m.

CVE-2024-46983 Remote Command Execution(RCE) Vulnerbility in sofa-hessian

2024-09-1922:47:14
CWE-74
GitHub_M
www.cve.org
3
remote command execution
vulnerability
sofa-hessian
ant group co.
blacklist
deserialization
gadget chain
jdk
upgrade
serialize blacklist.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.6%

sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory external/serialize.blacklist.

CNA Affected

[
  {
    "vendor": "sofastack",
    "product": "sofa-hessian",
    "versions": [
      {
        "version": "< 3.5.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.6%

Related for CVELIST:CVE-2024-46983