Description
sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
Published: 2024-09-19
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2768 sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
Github GHSA Github GHSA GHSA-c459-2m73-67hj SOFA Hessian Remote Command Execution (RCE) Vulnerability
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00137}

epss

{'score': 0.00161}


Wed, 25 Sep 2024 18:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo

Fri, 20 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Antfin
Antfin sofa-hessian
CPEs cpe:2.3:a:antfin:sofa-hessian:*:*:*:*:*:*:*:*
Vendors & Products Antfin
Antfin sofa-hessian
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 23:00:00 +0000

Type Values Removed Values Added
Description sofa-hessian is an internal improved version of Hessian3/4 powered by Ant Group CO., Ltd. The SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components. This issue is fixed by an update to the blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue. Users unable to upgrade may maintain a blacklist themselves in the directory `external/serialize.blacklist`.
Title Remote Command Execution(RCE) Vulnerbility in sofa-hessian
Weaknesses CWE-74
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Antfin Sofa-hessian
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-20T14:02:54.306Z

Reserved: 2024-09-16T16:10:09.018Z

Link: CVE-2024-46983

cve-icon Vulnrichment

Updated: 2024-09-20T14:02:48.733Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-19T23:15:11.920

Modified: 2024-09-25T17:46:48.927

Link: CVE-2024-46983

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses