Lucene search

K
githubGitHub Advisory DatabaseGHSA-C459-2M73-67HJ
HistorySep 19, 2024 - 2:49 p.m.

SOFA Hessian Remote Command Execution (RCE) Vulnerability

2024-09-1914:49:20
CWE-74
CWE-502
GitHub Advisory Database
github.com
3
sofa hessian
blacklist mechanism
deserialization
gadget chain
jdk
third-party components
sofahessian
software vulnerability

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

Low

EPSS

0

Percentile

9.6%

Impact

SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components.

Patches

Fixed this issue by update blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue.

Workarounds

You can maintain a blacklist yourself in this directory external/serialize.blacklist.

Affected configurations

Vulners
Node
com.alipay.sofahessianRange<3.5.5
VendorProductVersionCPE
com.alipay.sofahessian*cpe:2.3:a:com.alipay.sofa:hessian:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

Low

EPSS

0

Percentile

9.6%

Related for GHSA-C459-2M73-67HJ