4 results (0.024 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE. jaxb/JaxbEngine.java en Pippo 1.11.0 permite XEE (XML External Entity). • https://github.com/pippo-java/pippo/issues/486 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 10.0EPSS: 77%CPEs: 2EXPL: 2

parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java. parseObject en Fastjson en versiones anteriores a la 1.2.25, tal y como se emplea en FastjsonEngine en Pippo 1.11.0 y otros productos, permite que atacantes remotos ejecuten código arbitrario mediante una petición JSON manipulada, tal y como queda demostrado con un URI rmi:// manipulado en el campo dataSourceName de los datos HTTP POST en el URI Pippo /json, que se gestiona de manera incorrecta en AjaxApplication.java. • https://github.com/h0cksr/Fastjson--CVE-2017-18349- https://fortiguard.com/encyclopedia/ips/44059 https://github.com/alibaba/fastjson/wiki/security_update_20170315 https://github.com/pippo-java/pippo/issues/466 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution. Se ha descubierto un problema en Pippo 1.11.0. • https://github.com/pippo-java/pippo/issues/458 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Pippo through 1.11.0 allows remote code execution via a command to java.lang.ProcessBuilder because the XstreamEngine component does not use XStream's available protection mechanisms to restrict unmarshalling. Pippo hasta la versión 1.11.0 permite la ejecución remota de código mediante un comando en java.lang.ProcessBuilder debido a que el componente XstreamEngine no emplea los mecanismos de protección disponibles de XStream para restringir la deserialización. • https://github.com/pippo-java/pippo/issues/454 • CWE-502: Deserialization of Untrusted Data •