The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
References
| Link | Resource |
|---|---|
| https://www.ddosi.org/fastjson-poc/ | Exploit Third Party Advisory |
| https://github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15 | Patch Third Party Advisory |
| https://github.com/alibaba/fastjson/releases/tag/1.2.83 | Release Notes Third Party Advisory |
| https://github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d | Patch Third Party Advisory |
| https://github.com/alibaba/fastjson/wiki/security_update_20220523 | Third Party Advisory |
| https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222 | Third Party Advisory |
| https://www.oracle.com/security-alerts/cpujul2022.html |
Configurations
Information
Published : 2022-06-10 20:15
Updated : 2022-07-25 18:22
NVD link : CVE-2022-25845
Mitre link : CVE-2022-25845
JSON object : View
Products Affected
alibaba
- fastjson
CWE
CWE-502
Deserialization of Untrusted Data
