First published: Tue Oct 23 2018(Updated: )
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/ro.pippo:pippo-fastjson | <1.12.0 | 1.12.0 |
maven/com.alibaba:fastjson | <=1.2.24 | 1.2.31 |
libfastjson | <1.2.25 | |
Pippo | =1.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18349 is a vulnerability in Fastjson before version 1.2.25, which is used in Pippo 1.11.0 and other products, allowing remote attackers to execute arbitrary code via a crafted JSON request.
CVE-2017-18349 has a severity rating of 9.8 out of 10, indicating a critical vulnerability.
To fix CVE-2017-18349, update Fastjson to version 1.2.25 or later and Pippo to version 1.12.0 or later.
You can find more information about CVE-2017-18349 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2017-18349), [GitHub Issue](https://github.com/pippo-java/pippo/issues/466), [FortiGuard](https://fortiguard.com/encyclopedia/ips/44059).
The CWE ID for CVE-2017-18349 is 20, which corresponds to Improper Input Validation.