Total vulnerabilities in the database
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
Software | From | Fixed in |
---|---|---|
pippo / pippo | 1.11.0 | 1.11.0.x |
alibaba / fastjson | - | 1.2.25 |
![]() |
- | 1.2.31 |