Описание
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
Ссылки
- MitigationThird Party Advisory
- MitigationThird Party Advisory
- ExploitThird Party Advisory
- MitigationThird Party Advisory
- MitigationThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.2.25 (исключая)
Одно из
cpe:2.3:a:alibaba:fastjson:*:*:*:*:*:*:*:*
cpe:2.3:a:pippo:pippo:1.11.0:*:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.92079
Критический
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-20
Связанные уязвимости
CVSS3: 9.8
github
больше 7 лет назад
Improper Input Validation in alilibaba:fastjson
EPSS
Процентиль: 100%
0.92079
Критический
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-20