Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c459-2m73-67hj

Опубликовано: 19 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.1
CVSS3: 9.8

Описание

SOFA Hessian Remote Command Execution (RCE) Vulnerability

Impact

SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components.

Patches

Fixed this issue by update blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue.

Workarounds

You can maintain a blacklist yourself in this directory external/serialize.blacklist.

Пакеты

Наименование

com.alipay.sofa:hessian

maven
Затронутые версииВерсия исправления

< 3.5.5

3.5.5

EPSS

Процентиль: 33%
0.00129
Низкий

8.1 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-502
CWE-74

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.

EPSS

Процентиль: 33%
0.00129
Низкий

8.1 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-502
CWE-74