PT-2023-27908 · Sofarpc · Sofarpc
Bofei Chen
+2
·
Published
2023-09-12
·
Updated
2023-09-15
·
CVE-2023-41331
CVSS v3.1
9.8
Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Fix
Weakness Enumeration
Related Identifiers
Affected Products
Sofarpc
Bofei Chen
+2
·
Published
2023-09-12
·
Updated
2023-09-15
·
CVE-2023-41331
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
SOFARPC versions prior to 5.11.0
Description:
SOFARPC is a Java RPC framework. Through a carefully crafted payload, an attacker can achieve JNDI injection or system command execution. The default configuration of the SOFARPC framework uses a blacklist to filter out dangerous classes during the deserialization process. However, the blacklist is not comprehensive, allowing an actor to exploit certain native JDK classes and common third-party packages to construct gadget chains capable of achieving JNDI injection or system command execution attacks.
Recommendations:
For versions prior to 5.11.0, update to version 5.11.0 to resolve the issue.
As a temporary workaround, users can add `-Drpc serialize blacklist override=javax.sound.sampled.AudioFileFormat` to the blacklist.
Fix