Vulnerabilities
Vulnerable Software
Pippo:  >> Pippo  Security Vulnerabilities
XML Entity Expansion (Billion Laughs Attack) on Pippo 1.12.0 results in Denial of Service.Entities are created recursively and large amounts of heap memory is taken. Eventually, the JVM process will run out of memory. Otherwise, if the OS does not bound the memory on that process, memory will continue to be exhausted and will affect other processes on the system.
CVSS Score
7.5
EPSS Score
0.003
Published
2019-06-12
jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
CVSS Score
9.8
EPSS Score
0.004
Published
2018-12-11
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
CVSS Score
9.8
EPSS Score
0.908
Published
2018-10-23
An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
CVSS Score
9.8
EPSS Score
0.044
Published
2018-10-23
Pippo through 1.11.0 allows remote code execution via a command to java.lang.ProcessBuilder because the XstreamEngine component does not use XStream's available protection mechanisms to restrict unmarshalling.
CVSS Score
9.8
EPSS Score
0.027
Published
2018-10-11


Contact Us

Shodan ® - All rights reserved