Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-25845 PoC — Fastjson 代码问题漏洞

Source
Associated Vulnerability
Title:Fastjson 代码问题漏洞 (CVE-2022-25845)
Description:Fastjson是一款基于Java的快速JSON解析器/生成器。 Fastjson 1.2.83 之前版本存在安全漏洞,该漏洞源于容易绕过默认的 autoType 关闭限制来反序列化不受信任的数据,攻击者利用该漏洞可以攻击远程服务器。
Readme
# CVE-2022-25845-exploit

Try exploiting this CVE by studying some articles:

https://jfrog.com/blog/cve-2022-25845-analyzing-the-fastjson-auto-type-bypass-rce-vulnerability/

https://www.freebuf.com/vuls/339752.html

This is my analyze:

https://github.com/nerowander/CVE-2022-25845-exploit/blob/main/CVE-2022-25845.pdf
File Snapshot

[4.0K] /data/pocs/239b99403287d0e46122ccd5fb3030b96d12dfb0 ├── [4.0K] CVE-2022-25845-exp │   └── [4.0K] CVE-2022-25845 │   ├── [ 863] pom.xml │   └── [4.0K] src │   └── [4.0K] main │   └── [4.0K] java │   └── [4.0K] org │   └── [4.0K] example │   ├── [ 469] PocDemo.java │   └── [ 262] Poc.java ├── [1.5M] CVE-2022-25845.pdf └── [ 321] README.md 7 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.