CVE-2024-57762

7.5 HIGH

📋 TL;DR

MSFM before version 2025.01.01 contains a deserialization vulnerability in its pom.xml configuration file that could allow remote code execution. This affects systems running vulnerable versions of MSFM with the default configuration. Attackers could exploit this to execute arbitrary code on affected systems.

💻 Affected Systems

Products:
  • MSFM
Versions: All versions before 2025.01.01
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default pom.xml configuration file used by MSFM.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control of the system, leading to data theft, system compromise, and lateral movement within the network.

🟠

Likely Case

Remote code execution leading to application compromise, data exfiltration, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting the application service.

🌐 Internet-Facing: HIGH - Directly exploitable via configuration file manipulation without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems could exploit this for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of Java deserialization attacks and access to modify pom.xml configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.01.01

Vendor Advisory: https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVAT

Restart Required: No

Instructions:

1. Download MSFM version 2025.01.01 or later. 2. Replace existing installation with patched version. 3. Verify pom.xml configuration is updated.

🔧 Temporary Workarounds

Restrict pom.xml file access

Linux/Unix

Limit write access to pom.xml configuration file to prevent unauthorized modifications.

chmod 644 pom.xml
chown root:root pom.xml

🧯 If You Can't Patch

  • Implement strict file integrity monitoring on pom.xml configuration file
  • Deploy network segmentation to isolate MSFM instances from critical systems

🔍 How to Verify

Check if Vulnerable:

Check MSFM version and verify if pom.xml contains vulnerable deserialization configuration.

Check Version:

Check MSFM documentation for version command or examine pom.xml version tag

Verify Fix Applied:

Confirm MSFM version is 2025.01.01 or later and pom.xml has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual pom.xml modification events
  • Java deserialization errors in application logs
  • Unexpected process execution from MSFM

Network Indicators:

  • Unusual outbound connections from MSFM process
  • Suspicious payloads in HTTP requests to MSFM

SIEM Query:

source="msfm.log" AND ("deserialization" OR "pom.xml modification")

🔗 References

📤 Share & Export