sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
References
Link | Resource |
---|---|
https://github.com/sofastack/sofa-hessian/security/advisories/GHSA-c459-2m73-67hj | Vendor Advisory |
Configurations
History
25 Sep 2024, 17:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sofastack/sofa-hessian/security/advisories/GHSA-c459-2m73-67hj - Vendor Advisory | |
CPE | cpe:2.3:a:antfin:sofa-hessian:*:*:*:*:*:*:*:* | |
First Time |
Antfin sofa-hessian
Antfin |
|
CWE | NVD-CWE-noinfo |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Sep 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-19 23:15
Updated : 2024-09-25 17:46
NVD link : CVE-2024-46983
Mitre link : CVE-2024-46983
CVE.ORG link : CVE-2024-46983
JSON object : View
Products Affected
antfin
- sofa-hessian
CWE
NVD-CWE-noinfo
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')