CVE-2024-57762
Published: 15 January 2025
Summary
CVE-2024-57762 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Wangl1989 Mysiteforme. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 46.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 mandates timely identification, reporting, and correction of system flaws, directly mitigating CVE-2024-57762 by patching MSFM to v2025.01.01 or later.
SI-10 requires validation of information inputs such as the pom.xml configuration file, preventing improper deserialization of untrusted data.
RA-5 enables vulnerability scanning to identify the deserialization flaw in MSFM prior to exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Shiro deserialization vulnerability in MSFM web application enables remote code execution via manipulated RememberMe cookie over HTTP to public-facing endpoint (/index), exploiting vulnerable Shiro version <1.8.0 with hardcoded key.
NVD Description
MSFM before v2025.01.01 was discovered to contain a deserialization vulnerability via the pom.xml configuration file.
Deeper analysisAI
CVE-2024-57762 is a deserialization vulnerability (CWE-502) affecting MSFM versions prior to v2025.01.01. The issue arises in the handling of the pom.xml configuration file, allowing improper deserialization of untrusted data.
The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating that an unauthenticated attacker can exploit it remotely with low complexity and no user interaction. Successful exploitation enables high-impact confidentiality violations, such as unauthorized access to sensitive data, without affecting integrity or availability.
Mitigation involves updating to MSFM v2025.01.01 or later, as indicated by the vulnerability's versioning scope. Additional details are available in the advisory at https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVAT.
Details
- CWE(s)