Pippo 1.11.0

CPE Details

Pippo 1.11.0
1.11.0
2019-05-09
15h50 +00:00
2019-05-09
15h50 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:pippo:pippo:1.11.0:*:*:*:*:*:*:*

Informations

Vendor

pippo

Product

pippo

Version

1.11.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2018-20059 2018-12-11 10h00 +00:00 jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
9.8
Critical
CVE-2017-18349 2018-10-23 20h00 +00:00 parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
9.8
Critical
CVE-2018-18628 2018-10-23 20h00 +00:00 An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
9.8
Critical
CVE-2018-18240 2018-10-11 07h00 +00:00 Pippo through 1.11.0 allows remote code execution via a command to java.lang.ProcessBuilder because the XstreamEngine component does not use XStream's available protection mechanisms to restrict unmarshalling.
9.8
Critical