Article Details

Scrape Timestamp (UTC): 2024-12-27 06:48:10.361

Source: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html

Original Article Text

Click to Toggle View

Apache MINA CVE-2024-52046: CVSS 10.0 Flaw Enables RCE via Unsafe Serialization. The Apache Software Foundation (ASF) has released patches to address a maximum severity vulnerability in the MINA Java network application framework that could result in remote code execution under specific conditions. Tracked as CVE-2024-52046, the vulnerability carries a CVSS score of 10.0. It affects versions 2.0.X, 2.1.X, and 2.2.X. "The ObjectSerializationDecoder in Apache MINA uses Java's native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses," the project maintainers said in an advisory released on December 25, 2024. "This vulnerability allows attackers to exploit the deserialization process by sending specially crafted malicious serialized data, potentially leading to remote code execution (RCE) attacks." However, it bears noting that the vulnerability is exploitable only if the "IoBuffer#getObject()" method is invoked in combination with certain classes such as ProtocolCodecFilter and ObjectSerializationCodecFactory. "Upgrading will not be enough: you also need to explicitly allow the classes the decoder will accept in the ObjectSerializationDecoder instance, using one of the three new methods," Apache said. The disclosure comes days after the ASF remediated multiple flaws spanning Tomcat (CVE-2024-56337), Traffic Control (CVE-2024-45387), and HugeGraph-Server (CVE-2024-43441). Earlier this month, Apache also fixed a critical security flaw in the Struts web application framework (CVE-2024-53677) that an attacker could abuse to obtain remote code execution. Active exploitation attempts have since been detected. Users of these products are strongly advised to update their installations to the latest versions as soon as possible to safeguard against potential threats.

Daily Brief Summary

MALWARE // Critical Remote Code Execution Flaw in Apache MINA Patched

The Apache Software Foundation has patched a severe vulnerability in the MINA Java framework that could allow remote code execution.

Identified as CVE-2024-52046, this critical flaw has a CVSS score of 10.0 and impacts versions 2.0.X, 2.1.X, and 2.2.X.

The vulnerability stems from inadequate security checks in the ObjectSerializationDecoder, which uses Java's deserialization protocol.

Attackers can exploit this flaw by sending specially crafted malicious serialized data, potentially leading to remote code execution attacks.

Exploitation is conditional on the "IoBuffer#getObject()" method being used in conjunction with specific classes like ProtocolCodecFilter and ObjectSerializationCodecFactory.

Apache advises that upgrading alone is not sufficient; users must also implement new methods to restrict the classes that the decoder processes.

This disclosure follows recent fixes for multiple other security issues across various Apache products, including Tomcat and Struts, with active exploitation attempts detected.

Users are urged to update their software installations immediately to protect against these vulnerabilities.