Updated on 2024-08-28 GMT+08:00

Overview

Symptom

A deserialization remote code execution vulnerability is disclosed in Fastjson 1.2.80 and earlier versions. An attacker can use this vulnerability to bypass the autoType restriction so that they can remotely execute any code.

Impact and Risk

If a service with a vulnerability is attacked, attackers may remotely execute arbitrary code on the service platform.

Preventive Measures and Suggestions

Before any solution is proposed, you are advised to take the following preventive measures:

  1. Harden security borders of physical devices to prevent direct access from external networks and attacks to the internal network management plane.
  2. Check whether each component node of the platform uses the default password. If yes, change the password.
  3. Strengthen the management of account and passwords on the management plane to ensure that the information is not disclosed or spread.
  4. Some security vendors have provided preventive measures for this vulnerability. Set blocking rules on the security devices to prevent such attacks.