Powsybl, Deserialization Vulnerability, CVE-2024-1234 (Critical)

Listen to this Post

How the CVE Works

The vulnerability lies in the `read` method of the `SparseMatrix` class, which deserializes an `InputStream` into a `SparseMatrix` object. Attackers can exploit insecure deserialization by crafting malicious input streams, leading to arbitrary code execution or privilege escalation. This occurs when untrusted data is processed without proper validation, allowing attackers to manipulate object deserialization and execute unintended actions. Applications using `SparseMatrix.read()` with user-supplied or external streams are at risk.

DailyCVE Form

Platform: Powsybl
Version: <6.7.2
Vulnerability: Deserialization flaw
Severity: Critical
Date: 2024-03-15

Prediction: Patch by 2024-04-10

What Undercode Say

Check if vulnerable version is installed
mvn dependency:tree | grep "powsybl-math"
Exploit PoC (simplified)
InputStream maliciousStream = generateMaliciousPayload();
SparseMatrix.read(maliciousStream); // Triggers RCE

How Exploit

  • Craft malicious serialized `SparseMatrix`
    – Deliver via user-upload or network stream
  • Trigger deserialization for RCE

Protection from this CVE

  • Upgrade to powsybl-math ≥6.7.2
  • Disable `SparseMatrix.read()`
    – Validate input streams

Impact

  • Remote Code Execution (RCE)
  • Privilege escalation
  • System compromise

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top