SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components.
Fixed this issue by update blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue.
You can maintain a blacklist yourself in this directory external/serialize.blacklist.
{
"nvd_published_at": "2024-09-19T23:15:11Z",
"github_reviewed_at": "2024-09-19T14:49:20Z",
"cwe_ids": [
"CWE-502",
"CWE-74"
],
"severity": "HIGH",
"github_reviewed": true
}