Critical Fastjson RCE Vulnerability (≤1.2.68): Risks, Impact, and Fixes

On May 28, 2020, 360CERT reported a high‑severity remote code execution flaw in Alibaba’s Fastjson library (versions ≤1.2.68) that bypasses autotype restrictions, affecting many assets, and provided temporary mitigation steps and upgrade recommendations to safeguard systems.

Programmer DD
Programmer DD
Programmer DD
Critical Fastjson RCE Vulnerability (≤1.2.68): Risks, Impact, and Fixes

0x01 Vulnerability Background

On May 28, 2020, 360CERT detected a high‑severity remote code execution (RCE) vulnerability in Fastjson, Alibaba’s open‑source JSON parsing library for Java.

Fastjson can serialize Java objects to JSON and deserialize JSON back to Java objects. The flaw allows attackers to bypass the autotype switch restriction, craft a malicious deserialization chain, and achieve remote command execution. Exploitation requires a chain not blocked by Fastjson’s blacklist.

0x02 Risk Rating

360CERT rates the vulnerability as High severity with a Broad impact scope.

0x03 Affected Versions

Fastjson versions ≤ 1.2.68 are vulnerable.

0x04 Mitigation Recommendations

Temporary Fix

Upgrade to Fastjson 1.2.68 and enable SafeMode to disable autotype: ParserConfig.getGlobalInstance().setSafeMode(true); Note that SafeMode disables autotype entirely, which may affect business logic and should be evaluated.

0x05 Timeline

2020‑05‑28: 360CERT observed the security advisory from other vendors.

2020‑05‑28: 360CERT issued its own warning.

0x06 References

Fastjson ≤1.2.68 Remote Code Execution Advisory: https://cloud.tencent.com/announce/detail/1112

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

JavafastjsonCVEVulnerabilityRemote Code ExecutionSecurity Advisory
Programmer DD
Written by

Programmer DD

A tinkering programmer and author of "Spring Cloud Microservices in Action"

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.