The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
References
Link | Resource |
---|---|
https://www.ddosi.org/fastjson-poc/ | Exploit Third Party Advisory |
https://github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15 | Patch Third Party Advisory |
https://github.com/alibaba/fastjson/releases/tag/1.2.83 | Release Notes Third Party Advisory |
https://github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d | Patch Third Party Advisory |
https://github.com/alibaba/fastjson/wiki/security_update_20220523 | Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Information
Published : 2022-06-10 13:15
Updated : 2023-02-23 09:51
NVD link : CVE-2022-25845
Mitre link : CVE-2022-25845
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
oracle
- communications_cloud_native_core_unified_data_repository
alibaba
- fastjson