'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-09-24 | |
| Rule Name: | Fastjson 1.2.25 Deserialization Vulnerability (CVE-2017-18349) | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java. | |
| Impact: | An attacker can carefully construct malicious serialized data and pass it to the application, and execute the malicious code constructed by the attacker when the application deserializes the object. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | https://fortiguard.com/encyclopedia/ips/44059 |
|
| Solutions |
|---|
| Refer to the announcement or patch by the vendor: https://github.com/alibaba/fastjson/wiki/security_update_20170315 |