Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-70974

Опубликовано: 09 янв. 2026
Источник: redhat
CVSS3: 10

Описание

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

A flaw was found in Fastjson, a popular Java library for converting Java objects to JSON and vice versa. This vulnerability allows a remote attacker to execute arbitrary code on a system by sending a specially crafted JSON document. The issue stems from Fastjson's "autoType" feature, which, when mishandled, can lead to Java Naming and Directory Interface (JNDI) injection. This allows an attacker to inject and execute malicious code, posing a critical risk to affected systems. This flaw has been actively exploited in real-world attacks.

Отчет

In the Red Hat context, this vulnerability is rated Not Affected because the vulnerable code is not present in Red Hat products.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2openshift-service-mesh/grafana-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/istio-cni-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/istio-must-gather-rhel9Not affected
OpenShift Service Mesh 2openshift-service-mesh/istio-operator-bundleNot affected
OpenShift Service Mesh 2openshift-service-mesh/istio-rhel8-operatorNot affected
OpenShift Service Mesh 2openshift-service-mesh/pilot-rhel8Not affected
OpenShift Service Mesh 2openshift-service-mesh/proxyv2-rhel9Not affected
OpenShift Service Mesh 2openshift-service-mesh/ratelimit-rhel8Not affected
Red Hat build of Apache Camel for Spring Boot 4fastjsonNot affected
Red Hat build of Debezium 2fastjsonNot affected

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-829
https://bugzilla.redhat.com/show_bug.cgi?id=2428203fastjson: Fastjson: Remote Code Execution via JNDI Injection due to autoType mishandling

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
nvd
3 месяца назад

Fastjson before 1.2.48 mishandles autoType because, when an @type key is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.

CVSS3: 10
github
3 месяца назад

FASTJSON Includes Functionality from Untrusted Control Sphere

10 Critical

CVSS3