A bypass in the component sofa-hessian of Solon before v2.3.3 allows attackers to execute arbitrary code via providing crafted payload.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/noear/solon/issues/145 | issue tracking exploit |
https://github.com/noear/solon/compare/v2.3.2...v2.3.3 | release notes |