9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
52.9%
Fastjson1 Compatible is vulnerable to deserialization of untrusted data. The vulnerability exists in checkAutoType
function in ParserConfig.java
because the autoType shutdown is not properly restricted which allows an attacker to bypass it under certain conditions and attack remote servers.
CPE | Name | Operator | Version |
---|---|---|---|
fastjson1-compatible | le | 1.2.80 | |
fastjson1-compatible | le | 1.2.80 |
github.com/advisories/GHSA-pv7h-hx5h-mgfj
github.com/alibaba/fastjson/commit/097bff1a792e39f4e0b2807faa53af0e89fbe5e0
github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d
github.com/alibaba/fastjson/commit/560782c9ee12120304284ba98b61dc61e30324b3
github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15
github.com/alibaba/fastjson/releases/tag/1.2.83
github.com/alibaba/fastjson/wiki/security_update_20220523
www.ddosi.org/fastjson-poc/
www.oracle.com/security-alerts/cpujul2022.html
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
52.9%