Description
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xjrr-xv9m-4pw5 | Improper Input Validation in alilibaba:fastjson |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T00:02:21.255Z
Reserved: 2018-10-23T00:00:00.000Z
Link: CVE-2017-18349
No data.
Status : Modified
Published: 2018-10-23T20:29:00.263
Modified: 2024-11-21T03:19:54.190
Link: CVE-2017-18349
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA