CVE-2023-45146
Summary
| CVE | CVE-2023-45146 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-18 22:15:00 UTC |
| Updated | 2023-10-30 14:14:00 UTC |
| Description | XXL-RPC is a high performance, distributed RPC framework. With it, a TCP server can be set up using the Netty framework and the Hessian serialization mechanism. When such a configuration is used, attackers may be able to connect to the server and provide malicious serialized objects that, once deserialized, force it to execute arbitrary code. This can be abused to take control of the machine the server is running by way of remote code execution. This issue has not been fixed. |
Risk And Classification
Problem Types: CWE-502
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Xxl-rpc Project | Xxl-rpc | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| GHSL-2023-052: Unsafe deserialization in XXL-RPC - CVE-2023-45146 | GitHub Security Lab | MISC | securitylab.github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.