PT-2022-2951 · Alibaba · Fastjson
Unknown
·
Published
2022-05-06
·
Updated
2025-07-19
·
CVE-2022-25845
CVSS v2.0
10
Critical
| AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
com.alibaba:fastjson versions prior to 1.2.83
Description
The vulnerability is related to the deserialization of untrusted data by bypassing the default autoType shutdown restrictions in the Fastjson library. This can be exploited under certain conditions, allowing attackers to execute remote code. The issue is associated with the AutoTypeCheck mechanism in Fastjson, which can lead to security problems during deserialization if the JSON is controlled by the user and AutoType is enabled.
Recommendations
For versions prior to 1.2.83, update to version 1.2.83 or later.
As a temporary workaround, consider enabling safeMode, which disables the AutoType feature, effectively closing deserialization attack vectors.
Exploit
Fix
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Fastjson