Fastjson 1.2.67 Remote Code Execution Vulnerability Scanner
Detects 'Remote Code Execution (RCE)' vulnerability in Fastjson version 1.2.67
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
4 weeks
Scan only one
Domain, IPv4
Toolbox
-
Fastjson 1.2.67 is a version of the Fastjson library, a popular JSON processing library in Java. It is used in various Java applications for parsing, generating, and processing JSON data efficiently. This library is widely adopted in web services, data exchange between systems, and applications requiring high-speed JSON processing. Despite its efficiency and performance, this specific version contains a critical security vulnerability that allows remote code execution, posing significant risks to applications utilizing it.
The vulnerability in Fastjson 1.2.67 involves remote code execution through deserialization of maliciously crafted JSON data. Attackers can exploit this vulnerability by sending a specially crafted JSON request to the affected application, which leads to the execution of arbitrary code on the server. This vulnerability is particularly severe due to its network exploitability and the high level of privileges attackers can gain, as reflected by its CVSS score of 10.
The exploit utilizes the @type JSON attribute to specify a Java class that the library will attempt to deserialize. In this case, the com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig class is abused to execute remote code via RMI (Remote Method Invocation) by manipulating the UserTransaction property. This vulnerability bypasses security checks and allows attackers to execute code remotely without authentication, leading to potential system compromise.
The exploitation of this vulnerability can have severe consequences, including unauthorized access to system resources, data theft, and potentially full system control. Attackers could leverage this access to deploy further malicious activities, such as spreading malware, escalating privileges within networks, and exfiltrating sensitive information, threatening the confidentiality, integrity, and availability of the affected systems.
At S4E, our advanced scanning technology provides comprehensive vulnerability detection, including the critical Fastjson 1.2.67 RCE flaw. By joining our platform, users gain access to detailed analysis, real-time monitoring, and actionable remediation advice, helping protect their digital assets against sophisticated threats. Enhance your cybersecurity posture with S4E and safeguard your systems against vulnerabilities like this.
References