CVE-2024-57763
Published: 15 January 2025
Summary
CVE-2024-57763 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Wangl1989 Mysiteforme. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation of untrusted inputs to the system/table/addField endpoint to block malicious fastjson deserialization payloads.
SI-2 requires timely flaw remediation by upgrading MSFM to version 2025.01.01 or later to eliminate the deserialization vulnerability.
CM-6 enforces secure configuration settings for the fastjson library to disable unsafe deserialization features like autoType.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The fastjson deserialization vulnerability in the /admin/system/table/addField endpoint allows authenticated remote code execution via crafted JSON payloads using gadgets like JdbcRowSetImpl for JNDI/RMI lookups, enabling exploitation of a public-facing web application.
NVD Description
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/addField.
Deeper analysisAI
CVE-2024-57763 is a deserialization vulnerability (CWE-502) in MSFM versions prior to 2025.01.01, stemming from unsafe use of the fastjson library in the system/table/addField component. This flaw allows attackers to process untrusted data, leading to potential remote code execution or other severe impacts. The vulnerability received a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), classifying it as critical due to its network accessibility, low complexity, and lack of prerequisites.
Unauthenticated remote attackers can exploit this vulnerability over the network with minimal effort and no user interaction required. Successful exploitation grants high confidentiality and integrity impacts, enabling attackers to access sensitive data or manipulate system state, such as executing arbitrary code through crafted deserialization payloads sent to the affected endpoint.
Mitigation involves upgrading to MSFM version 2025.01.01 or later, which addresses the fastjson deserialization issue. Additional details are available in the advisory at https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVFD.
Details
- CWE(s)