fastjson1.2.80
时间: 2023-08-25 21:08:03 浏览: 170
fastjson-1.2.80
Fastjson v1.2.80存在AutoType绕过反序列化漏洞。 该版本引入了AutoType机制,其中在`DefaultJSONParser`中增加了`checkAutoType`检查来解决该漏洞。 您引用的POST请求中构造了一个POC来利用该漏洞。 该POC通过使用重复的`"@type"`字段来绕过反序列化检查。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* *2* [Fastjson v1.2.80 Throwable AutoType 机制绕过漏洞分析](https://blog.csdn.net/include_voidmain/article/details/124983839)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"]
- *3* [【漏洞分析】Fastjson1.2.80版本RCE漏洞原理](https://blog.csdn.net/olga5abl/article/details/127492012)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_2"}}] [.reference_item style="max-width: 50%"]
[ .reference_list ]
阅读全文