Cyber Posture

CVE-2024-57763

CriticalPublic PoCRCE

Published: 15 January 2025

Published
15 January 2025
Modified
10 April 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0026 49.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57763 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Wangl1989 Mysiteforme. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates validation of untrusted inputs to the system/table/addField endpoint to block malicious fastjson deserialization payloads.

prevent

SI-2 requires timely flaw remediation by upgrading MSFM to version 2025.01.01 or later to eliminate the deserialization vulnerability.

prevent

CM-6 enforces secure configuration settings for the fastjson library to disable unsafe deserialization features like autoType.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The fastjson deserialization vulnerability in the /admin/system/table/addField endpoint allows authenticated remote code execution via crafted JSON payloads using gadgets like JdbcRowSetImpl for JNDI/RMI lookups, enabling exploitation of a public-facing web application.

NVD Description

MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/addField.

Deeper analysisAI

CVE-2024-57763 is a deserialization vulnerability (CWE-502) in MSFM versions prior to 2025.01.01, stemming from unsafe use of the fastjson library in the system/table/addField component. This flaw allows attackers to process untrusted data, leading to potential remote code execution or other severe impacts. The vulnerability received a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), classifying it as critical due to its network accessibility, low complexity, and lack of prerequisites.

Unauthenticated remote attackers can exploit this vulnerability over the network with minimal effort and no user interaction required. Successful exploitation grants high confidentiality and integrity impacts, enabling attackers to access sensitive data or manipulate system state, such as executing arbitrary code through crafted deserialization payloads sent to the affected endpoint.

Mitigation involves upgrading to MSFM version 2025.01.01 or later, which addresses the fastjson deserialization issue. Additional details are available in the advisory at https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVFD.

Details

CWE(s)

Affected Products

wangl1989
mysiteforme
≤ 2025-01-01

CVEs Like This One

CVE-2024-57762Same product: Wangl1989 Mysiteforme
CVE-2024-57766Same product: Wangl1989 Mysiteforme
CVE-2024-57764Same product: Wangl1989 Mysiteforme
CVE-2024-13136Same product: Wangl1989 Mysiteforme
CVE-2025-26136Same product: Wangl1989 Mysiteforme
CVE-2024-13139Same product: Wangl1989 Mysiteforme
CVE-2024-13138Same product: Wangl1989 Mysiteforme
CVE-2024-57767Same product: Wangl1989 Mysiteforme
CVE-2024-57765Same product: Wangl1989 Mysiteforme
CVE-2025-67617Shared CWE-502

References