sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
History

Fri, 20 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Antfin
Antfin sofa-hessian
CPEs cpe:2.3:a:antfin:sofa-hessian:*:*:*:*:*:*:*:*
Vendors & Products Antfin
Antfin sofa-hessian
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 23:00:00 +0000

Type Values Removed Values Added
Description sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
Title Remote Command Execution(RCE) Vulnerbility in sofa-hessian
Weaknesses CWE-74
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-19T22:47:14.438Z

Updated: 2024-09-20T14:02:54.306Z

Reserved: 2024-09-16T16:10:09.018Z

Link: CVE-2024-46983

cve-icon Vulnrichment

Updated: 2024-09-20T14:02:48.733Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-19T23:15:11.920

Modified: 2024-09-20T12:30:17.483

Link: CVE-2024-46983

cve-icon Redhat

No data.