sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 25 Sep 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo |
Fri, 20 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Antfin
Antfin sofa-hessian |
|
| CPEs | cpe:2.3:a:antfin:sofa-hessian:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Antfin
Antfin sofa-hessian |
|
| Metrics |
ssvc
|
Thu, 19 Sep 2024 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`. | |
| Title | Remote Command Execution(RCE) Vulnerbility in sofa-hessian | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-09-19T22:47:14.438Z
Updated: 2024-09-20T14:02:54.306Z
Reserved: 2024-09-16T16:10:09.018Z
Link: CVE-2024-46983
Updated: 2024-09-20T14:02:48.733Z
Status : Analyzed
Published: 2024-09-19T23:15:11.920
Modified: 2024-09-25T17:46:48.927
Link: CVE-2024-46983
No data.