nGrinder version prior to 3.5.9 is vulnerable to a critical security issue, CVE-2024-28213. This vulnerability allows unauthenticated users to send serialized Java objects to the application, potentially enabling a remote attacker to execute arbitrary code through unsafe Java object deserialization.
- CVE ID: CVE-2024-28213
- Published Date: 2024-03-07
- Updated Date: 2024-03-07
- Source: Naver Corporation
- Vulnerability Category: Execute code
- CWE IDs: CWE-502 (Deserialization of Untrusted Data)
The exploitation of this vulnerability could lead to remote code execution, giving attackers unauthorized access to the system and potentially allowing them to take control of the affected server.
nGrinder versions prior to 3.5.9 are affected by this vulnerability.
To mitigate the risk associated with this vulnerability, it is highly recommended to upgrade nGrinder to version 3.5.9 or later, where the issue has been addressed. Additionally, organizations should ensure that the application is not directly accessible from untrusted networks and implement proper network segmentation and access controls.
According to the Exploit Prediction Scoring System (EPSS), the probability of exploitation activity in the next 30 days is estimated to be 0.04%.
A proof of concept (PoC) for CVE-2024-28213 is available for purchase. The PoC is priced at $270.22 USD (by current exchange rate) 5 and is available in a limited quantity of 5. To obtain the PoC : https://satoshidisk.com/pay/CKp6DL