CVE-2025-13805

3.7 LOW

📋 TL;DR

This vulnerability in NutzBoot's LiteRpc-Serializer component allows remote attackers to execute arbitrary code through deserialization attacks. It affects systems running NutzBoot up to version 2.6.0-SNAPSHOT with the vulnerable component enabled. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • nutzam NutzBoot
Versions: Up to 2.6.0-SNAPSHOT
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the LiteRpc-Serializer component to be enabled and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Remote code execution with limited privileges, potentially leading to service disruption or data exfiltration.

🟢

If Mitigated

Denial of service or failed exploitation attempts if proper input validation and deserialization controls are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploit requires specific manipulation of the getInputStream function and understanding of the deserialization chain.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Monitor NutzBoot GitHub repository for security updates. 2. Upgrade to a patched version when available. 3. Restart affected services after patching.

🔧 Temporary Workarounds

Disable LiteRpc-Serializer Component

all

Remove or disable the vulnerable LiteRpc-Serializer component if not required.

Modify application configuration to exclude nutzcloud-literpc dependency

Implement Input Validation

all

Add strict input validation and filtering for all deserialization operations.

Implement custom ObjectInputStream with restricted class loading

🧯 If You Can't Patch

  • Network segmentation to isolate vulnerable systems
  • Implement strict firewall rules to limit access to affected endpoints

🔍 How to Verify

Check if Vulnerable:

Check NutzBoot version and verify if nutzcloud-literpc component is present in dependencies.

Check Version:

Check pom.xml or build.gradle for NutzBoot version, or run application with --version flag

Verify Fix Applied:

Verify NutzBoot version is above 2.6.0-SNAPSHOT and check for security patches in release notes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual deserialization errors
  • Unexpected Java class loading
  • Suspicious network requests to LiteRpc endpoints

Network Indicators:

  • Malformed serialized objects in HTTP requests
  • Unexpected connections to deserialization endpoints

SIEM Query:

source="application.logs" AND ("deserialization" OR "ClassNotFoundException" OR "InvalidClassException")

🔗 References

📤 Share & Export