sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Sep 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo |
Fri, 20 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Antfin
Antfin sofa-hessian |
|
CPEs | cpe:2.3:a:antfin:sofa-hessian:*:*:*:*:*:*:*:* | |
Vendors & Products |
Antfin
Antfin sofa-hessian |
|
Metrics |
ssvc
|
Thu, 19 Sep 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`. | |
Title | Remote Command Execution(RCE) Vulnerbility in sofa-hessian | |
Weaknesses | CWE-74 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-20T14:02:54.306Z
Reserved: 2024-09-16T16:10:09.018Z
Link: CVE-2024-46983

Updated: 2024-09-20T14:02:48.733Z

Status : Analyzed
Published: 2024-09-19T23:15:11.920
Modified: 2024-09-25T17:46:48.927
Link: CVE-2024-46983

No data.