SOFA Hessian protocol uses a blacklist mechanism to restrict deserialization of potentially dangerous classes for security protection. But there is a gadget chain that can bypass the SOFA Hessian blacklist protection mechanism, and this gadget chain only relies on JDK and does not rely on any third-party components.
Fixed this issue by update blacklist, users can upgrade to sofahessian version 3.5.5 to avoid this issue.
You can maintain a blacklist yourself in this directory external/serialize.blacklist
.
{ "nvd_published_at": "2024-09-19T23:15:11Z", "cwe_ids": [ "CWE-502", "CWE-74" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-09-19T14:49:20Z" }