Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-25845 PoC — Fastjson 代码问题漏洞

Source
Associated Vulnerability
Title:Fastjson 代码问题漏洞 (CVE-2022-25845)
Description:Fastjson是一款基于Java的快速JSON解析器/生成器。 Fastjson 1.2.83 之前版本存在安全漏洞,该漏洞源于容易绕过默认的 autoType 关闭限制来反序列化不受信任的数据,攻击者利用该漏洞可以攻击远程服务器。
Description
[fastjson 1.2.80] CVE-2022-25845 aspectj fileread & groovy remote classload
Readme
[Fastjson1.2.80漏洞复现](https://hosch3n.github.io/2022/09/01/Fastjson1-2-80%E6%BC%8F%E6%B4%9E%E5%A4%8D%E7%8E%B0/)
File Snapshot

[4.0K] /data/pocs/8c93691f2b12014b1e4a497ede98493399476115 ├── [1.6K] pom.xml ├── [ 118] README.md └── [4.0K] src └── [4.0K] main └── [4.0K] java ├── [1.6K] aspectj.java ├── [ 568] Evil.java └── [1.0K] groovy.java 3 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.