CVE-2024-57766

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote code execution through fastjson deserialization in MSFM's table editing component. Attackers can exploit this to execute arbitrary code on affected systems. All systems running vulnerable versions of MSFM are affected.

💻 Affected Systems

Products:
  • MSFM
Versions: All versions before 2025.01.01
Operating Systems: Any OS running MSFM
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the system/table/editField component which appears to be part of the default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the server, allowing data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to web server compromise, data exfiltration, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation and application firewalls block malicious payloads before reaching the vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Fastjson deserialization vulnerabilities are well-understood and frequently exploited. The component appears to be accessible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.01.01 or later

Vendor Advisory: https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVHR

Restart Required: Yes

Instructions:

1. Download MSFM version 2025.01.01 or later from the official repository. 2. Backup current installation and configuration. 3. Replace the vulnerable files with patched versions. 4. Restart the MSFM service.

🔧 Temporary Workarounds

Disable vulnerable endpoint

linux

Block or disable access to the system/table/editField component

# Add firewall rule to block access to vulnerable endpoint
iptables -A INPUT -p tcp --dport [MSFM_PORT] -m string --string "system/table/editField" --algo bm -j DROP

Input validation filter

all

Implement WAF rules to filter malicious fastjson payloads

# Example mod_security rule
SecRule REQUEST_BODY "@rx \\"@type\\"" "id:1001,phase:2,deny,msg:'Fastjson deserialization attempt'"
# Add to web server configuration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MSFM from critical systems
  • Deploy web application firewall with rules specifically targeting fastjson deserialization patterns

🔍 How to Verify

Check if Vulnerable:

Check MSFM version and verify if system/table/editField endpoint accepts fastjson payloads. Test with safe deserialization payloads if possible.

Check Version:

Check MSFM configuration files or admin interface for version information. Look for version.txt or similar files in installation directory.

Verify Fix Applied:

Verify MSFM version is 2025.01.01 or later. Test that system/table/editField endpoint properly validates input and rejects malicious fastjson payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to system/table/editField endpoint
  • Java process spawning unexpected child processes
  • Error logs containing fastjson deserialization exceptions

Network Indicators:

  • HTTP requests containing fastjson payloads with @type parameters
  • Unusual outbound connections from MSFM server

SIEM Query:

source="msfm.logs" AND (uri="/system/table/editField" OR message="fastjson")

🔗 References

📤 Share & Export