Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0286 | SOFARPC is a Java RPC framework. SOFARPC defaults to using the SOFA Hessian protocol to deserialize received data, while the SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But, prior to version 5.12.0, there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. Version 5.12.0 fixed this issue by adding a blacklist. SOFARPC also provides a way to add additional blacklists. Users can add a class like `-Drpc_serialize_blacklist_override=org.apache.xpath.` to avoid this issue. |
Github GHSA |
GHSA-7q8p-9953-pxvr | Remote Command Execution in SOFARPC |
Fri, 18 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-10-18T16:00:41.941Z
Reserved: 2024-01-19T00:18:53.232Z
Link: CVE-2024-23636
Updated: 2024-08-01T23:06:25.273Z
Status : Modified
Published: 2024-01-23T18:15:19.433
Modified: 2024-11-21T08:58:03.447
Link: CVE-2024-23636
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA