DoS Vulnerability in the Open-Source Component Fastjson
On September 3, 2019, the security team detected a DoS vulnerability in multiple versions of the widely used open-source component Fastjson. An attacker can exploit this vulnerability to construct malicious requests and send them to the server that uses Fastjson. As a result, the memory and CPU of the server are used up, and the server breaks down, causing service breakdown. WAF provides protection against this vulnerability.
Affected Versions
Versions earlier than Fastjson 1.2.60
Mitigation Version
Fastjson 1.2.60
Official Solution
Upgrade the open-source component Fastjson to 1.2.60.
Mitigation
WAF can detect and defend against this vulnerability. The procedure is as follows:
- Apply for a dedicated WAF instance.
- Add the website domain name to WAF and route website traffic to WAF.
- Cloud mode: Creating a Domain Name
- Dedicated mode: Step 1: Add a Website to WAF (Dedicated Mode)
- Set the mode of Basic Web Protection to Block. For details, see Configuring Basic Protection Rules to Defend Against Common Web Attacks.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot