| ID |
CVE-2017-18349
|
| Sažetak |
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java. |
| Reference |
|
| CVSS |
| Base: | 10.0 |
| Impact: | 10.0 |
| Exploitability: | 10.0 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
28-01-2019 - 20:57 |
| Objavljeno |
23-10-2018 - 20:29 |