SOFARPC is a Java RPC framework. SOFARPC defaults to using the SOFA Hessian protocol to deserialize received data, while the SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But, prior to version 5.12.0, there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. Version 5.12.0 fixed this issue by adding a blacklist. SOFARPC also provides a way to add additional blacklists. Users can add a class like `-Drpc_serialize_blacklist_override=org.apache.xpath.` to avoid this issue.
References
Configurations
History
21 Nov 2024, 08:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sofastack/sofa-rpc/commit/42d19b1b1d14a25aafd9ef7c219c04a19f90fc76 - Patch | |
References | () https://github.com/sofastack/sofa-rpc/security/advisories/GHSA-7q8p-9953-pxvr - Vendor Advisory |
01 Feb 2024, 20:17
Type | Values Removed | Values Added |
---|---|---|
First Time |
Sofastack
Sofastack sofarpc |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:sofastack:sofarpc:*:*:*:*:*:*:*:* | |
References | () https://github.com/sofastack/sofa-rpc/security/advisories/GHSA-7q8p-9953-pxvr - Vendor Advisory | |
References | () https://github.com/sofastack/sofa-rpc/commit/42d19b1b1d14a25aafd9ef7c219c04a19f90fc76 - Patch |
23 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-23 18:15
Updated : 2024-11-21 08:58
NVD link : CVE-2024-23636
Mitre link : CVE-2024-23636
CVE.ORG link : CVE-2024-23636
JSON object : View
Products Affected
sofastack
- sofarpc
CWE
CWE-502
Deserialization of Untrusted Data