Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-18349

EPSS 88.69% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-18349

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Pippo FastjsonEngine Fastjson 输入验证漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Pippo是一款基于Java的Web框架。FastjsonEngine是其中的一个JSON处理引擎。Fastjson是其中的一个基于Java的JSON解析器/生成器。 Pippo 1.11.0版本中的FastjsonEngine所使用的Fastjson 1.2.25之前版本的parseObject存在安全漏洞。远程攻击者可通过发送特制的JSON请求利用该漏洞执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-18349

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/h0cksr/Fastjson--CVE-2017-18349-POC Details
2parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi-// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-18349.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-18349

Please Login to view more intelligence information

Same Patch Batch · n/a · 2018-10-23 · 33 CVEs total

CVE-2018-7429Splunk Enterprise和Splunk Light 安全漏洞
CVE-2018-18585Libmspack 代码问题漏洞
CVE-2018-18584Libmspack和cabextract 缓冲区错误漏洞
CVE-2018-18586Libmspack 路径遍历漏洞
CVE-2018-18587BigProf AppGini 安全漏洞
CVE-2018-18603Qihu 360 Total Security 输入验证错误漏洞
CVE-2018-18599Stegdetect 缓冲区错误漏洞
CVE-2018-18607GNU Binutils 代码问题漏洞
CVE-2018-18606GNU Binutils 代码问题漏洞
CVE-2018-18605GNU Binutils 缓冲区错误漏洞
CVE-2018-18622Waimai Super Cms 跨站脚本漏洞
CVE-2018-18608DedeCMS 跨站脚本漏洞
CVE-2018-18626PHPYun 输入验证错误漏洞
CVE-2018-18628Pippo 安全漏洞
CVE-2018-7432Splunk Enterprise和Splunk Light 安全漏洞
CVE-2018-7431Splunk Enterprise和Splunk Light Splunk Django App 路径遍历漏洞
CVE-2018-12901Mitel ST conferencing组件跨站脚本漏洞
CVE-2018-7427Splunk Enterprise和Splunk Light 跨站脚本漏洞
CVE-2018-18475ZOHO ManageEngine OpManager 安全漏洞
CVE-2018-18467Daniel Gultsch Conversations 信息泄露漏洞

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-18349

No comments yet


Leave a comment