First published: Fri Jun 10 2022(Updated: )
A flaw was found in com.alibaba:fastjson, a fast JSON parser/generator for Java. Affected versions of this package are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/fastjson | <1.2.83 | 1.2.83 |
Alibaba Fastjson | <1.2.83 | |
Oracle Communications Cloud Native Core Unified Data Repository | =22.2.0 | |
maven/com.alibaba:fastjson | >=1.2.25<1.2.83 | 1.2.83 |
Users who can not upgrade to the fixed version may enable safeMode; this completely disables the autoType function and eliminates the vulnerability risk. [https://github.com/alibaba/fastjson/wiki/fastjson_safemode]
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25845 is a vulnerability in the com.alibaba:fastjson package that allows for the deserialization of untrusted data, potentially leading to remote server attacks.
CVE-2022-25845 has a severity rating of 9.8, which is considered critical.
CVE-2022-25845 affects com.alibaba:fastjson versions before 1.2.83 and allows for the bypassing of default autoType shutdown restrictions during deserialization.
The recommended workaround for CVE-2022-25845 is to upgrade to version 1.2.83 of the com.alibaba:fastjson package.
More information about CVE-2022-25845 can be found at the following references: [Reference 1](https://access.redhat.com/errata/RHSA-2022:5532), [Reference 2](https://access.redhat.com/security/cve/cve-2022-25845), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi?id=2100654).