The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
References
Link | Resource |
---|---|
https://github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d | Patch Third Party Advisory |
https://github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15 | Patch Third Party Advisory |
https://github.com/alibaba/fastjson/releases/tag/1.2.83 | Release Notes Third Party Advisory |
https://github.com/alibaba/fastjson/wiki/security_update_20220523 | Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222 | Third Party Advisory |
https://www.ddosi.org/fastjson-poc/ | Exploit Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-06-10 20:15
Updated : 2023-02-23 17:51
NVD link : CVE-2022-25845
Mitre link : CVE-2022-25845
CVE.ORG link : CVE-2022-25845
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_unified_data_repository
alibaba
- fastjson
CWE
CWE-502
Deserialization of Untrusted Data