CVE-2023-25581

Org.pac4j Pac4j-core < 4.0.0 - Insecure Deserialization

Title source: rule

Description

pac4j is a security framework for Java. `pac4j-core` prior to version 4.0.0 is affected by a Java deserialization vulnerability. The vulnerability affects systems that store externally controlled values in attributes of the `UserProfile` class from pac4j-core. It can be exploited by providing an attribute that contains a serialized Java object with a special prefix `{#sb64}` and Base64 encoding. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. pac4j versions 4.0.0 and greater are not affected by this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Exploits (1)

nomisec WORKING POC
by p33d · poc
https://github.com/p33d/CVE-2023-25581

Scores

EPSS 0.1903
EPSS Percentile 95.2%

Classification

CWE
CWE-502
Status draft

Affected Products (1)

org.pac4j/pac4j-core < 4.0.0Maven

Timeline

Published Oct 10, 2024
Tracked Since Feb 18, 2026