PT-2023-27908 · Sofarpc · Sofarpc

Bofei Chen

+2

·

Published

2023-09-12

·

Updated

2023-09-15

·

CVE-2023-41331

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

SOFARPC versions prior to 5.11.0

Description:

SOFARPC is a Java RPC framework. Through a carefully crafted payload, an attacker can achieve JNDI injection or system command execution. The default configuration of the SOFARPC framework uses a blacklist to filter out dangerous classes during the deserialization process. However, the blacklist is not comprehensive, allowing an actor to exploit certain native JDK classes and common third-party packages to construct gadget chains capable of achieving JNDI injection or system command execution attacks.

Recommendations:

For versions prior to 5.11.0, update to version 5.11.0 to resolve the issue.

As a temporary workaround, users can add `-Drpc serialize blacklist override=javax.sound.sampled.AudioFileFormat` to the blacklist.

Fix

Weakness Enumeration

Related Identifiers

CVE-2023-41331
GHSA-CHV2-7HXJ-2J86

Affected Products

Sofarpc