CVE-2020-24164: Gadget chain attack in Nippy
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.35077%
CWE
Published
2/10/2022
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.taoensso:nippy | maven | < 2.14.2 | 2.14.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Nippy's automatic use of Java Serializable interface without proper validation. The commit diff shows: 1) Added serializable-whitelist to gate Serializable usage 2) Modified write-serializable to check this whitelist before writing objects 3) Created read-serializable-depr1 to handle legacy serialization with security checks. The original write-serializable and read-serializable functions lacked these protections, allowing arbitrary class deserialization. This matches the CWE-502 pattern where untrusted data deserialization occurs without proper validation, enabling RCE through malicious payloads.