CVE-2024-23052

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on WuKongCRM systems by exploiting a deserialization flaw in the fastjson component's parseObject() function. Any organization running the affected WuKongCRM version is vulnerable to complete system compromise. The high CVSS score of 9.8 indicates critical severity with low attack complexity.

💻 Affected Systems

Products:
  • WuKongOpenSource WukongCRM
Versions: v.72crm_9.0.1_20191202
Operating Systems: Any OS running the affected Java application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using the vulnerable fastjson component version within WuKongCRM. The vulnerability is in the application layer, not OS-specific.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands, steal sensitive data, install persistent backdoors, pivot to internal networks, and potentially destroy systems.

🟠

Likely Case

Remote code execution leading to data theft, ransomware deployment, or unauthorized access to customer relationship management data and connected systems.

🟢

If Mitigated

Limited impact if proper network segmentation, application firewalls, and input validation are in place, though exploitation risk remains high.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repositories contain proof-of-concept code demonstrating exploitation. Fastjson vulnerabilities are commonly weaponized due to their prevalence in Java applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: Yes

Instructions:

1. Check WuKongCRM GitHub repository for security updates
2. Update fastjson dependency to a secure version (1.2.83 or later)
3. Rebuild and redeploy the application
4. Restart all affected services

🔧 Temporary Workarounds

Fastjson Version Upgrade

all

Manually upgrade the fastjson library to a secure version that patches the deserialization vulnerability

Update Maven/Gradle dependency to com.alibaba:fastjson:1.2.83 or later
Rebuild application with updated dependencies

Input Validation Filter

all

Implement strict input validation and filtering for all JSON parsing operations

Configure application to use SafeMode or implement custom deserialization filters
Add request validation middleware

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WuKongCRM from critical systems
  • Deploy a web application firewall (WAF) with rules to detect and block fastjson exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check application dependencies for fastjson version <1.2.83 and verify WuKongCRM version matches affected version

Check Version:

Check pom.xml or build.gradle for fastjson version, or run: java -cp wukongcrm.jar com.alibaba.fastjson.Version

Verify Fix Applied:

Verify fastjson dependency is updated to 1.2.83 or later and test JSON parsing functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java deserialization errors
  • Suspicious class loading in application logs
  • Unexpected process execution from Java runtime

Network Indicators:

  • HTTP requests with malicious JSON payloads targeting parseObject endpoints
  • Outbound connections from WuKongCRM to unknown external IPs

SIEM Query:

source="wukongcrm.logs" AND ("parseObject" OR "fastjson" OR "ClassNotFoundException") AND severity=ERROR

🔗 References

📤 Share & Export