Description
The package com.alibaba:fastjson before 1.2.83 are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [safeMode](https://github.com/alibaba/fastjson/wiki/fastjson_safemode).
Remediation
References
https://github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d
https://github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15
https://github.com/alibaba/fastjson/releases/tag/1.2.83
https://github.com/alibaba/fastjson/wiki/security_update_20220523
https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222
https://www.ddosi.org/fastjson-poc/
https://www.oracle.com/security-alerts/cpujul2022.html
Related Vulnerabilities
CVE-2023-39151 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-32769 Vulnerability in maven package io.micronaut:micronaut-core
CVE-2022-31108 Vulnerability in maven package org.webjars.bower:mermaid
CVE-2022-21192 Vulnerability in npm package serve-lite
CVE-2022-29577 Vulnerability in maven package org.owasp.antisamy:antisamy