Логотип exploitDog
bind:CVE-2024-23636
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-23636

Количество 2

Количество 2

nvd логотип

CVE-2024-23636

около 2 лет назад

SOFARPC is a Java RPC framework. SOFARPC defaults to using the SOFA Hessian protocol to deserialize received data, while the SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But, prior to version 5.12.0, there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. Version 5.12.0 fixed this issue by adding a blacklist. SOFARPC also provides a way to add additional blacklists. Users can add a class like `-Drpc_serialize_blacklist_override=org.apache.xpath.` to avoid this issue.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-7q8p-9953-pxvr

около 2 лет назад

Remote Command Execution in SOFARPC

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-23636

SOFARPC is a Java RPC framework. SOFARPC defaults to using the SOFA Hessian protocol to deserialize received data, while the SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But, prior to version 5.12.0, there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. Version 5.12.0 fixed this issue by adding a blacklist. SOFARPC also provides a way to add additional blacklists. Users can add a class like `-Drpc_serialize_blacklist_override=org.apache.xpath.` to avoid this issue.

CVSS3: 9.8
1%
Низкий
около 2 лет назад
github логотип
GHSA-7q8p-9953-pxvr

Remote Command Execution in SOFARPC

CVSS3: 9.8
1%
Низкий
около 2 лет назад

Уязвимостей на страницу