CVE-2018-7489
FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
- Published date
- 2018-02-26T15:29Z
- Last modification date
- 2021-03-25T01:15Z
- Assigner
- cve@mitre.org
- Problem type
- CWE-184
Impact
- CVSS v3 vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name | URL | Source | Tags |
---|---|---|---|
https://github.com/FasterXML/jackson-databind/issues/1931 | https://github.com/FasterXML/jackson-databind/issues/1931 | CONFIRM | Third Party Advisory |
103203 | http://www.securityfocus.com/bid/103203 | BID | Third Party Advisory, VDB Entry |
https://security.netapp.com/advisory/ntap-20180328-0001/ | https://security.netapp.com/advisory/ntap-20180328-0001/ | CONFIRM | Third Party Advisory |
1040693 | http://www.securitytracker.com/id/1040693 | SECTRACK | Third Party Advisory, VDB Entry |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html | http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html | CONFIRM | Patch |
DSA-4190 | https://www.debian.org/security/2018/dsa-4190 | DEBIAN | Third Party Advisory |
RHSA-2018:1451 | https://access.redhat.com/errata/RHSA-2018:1451 | REDHAT | Third Party Advisory |
RHSA-2018:1450 | https://access.redhat.com/errata/RHSA-2018:1450 | REDHAT | Third Party Advisory |
RHSA-2018:1449 | https://access.redhat.com/errata/RHSA-2018:1449 | REDHAT | Third Party Advisory |
RHSA-2018:1448 | https://access.redhat.com/errata/RHSA-2018:1448 | REDHAT | Third Party Advisory |
RHSA-2018:1447 | https://access.redhat.com/errata/RHSA-2018:1447 | REDHAT | Third Party Advisory |
RHSA-2018:1786 | https://access.redhat.com/errata/RHSA-2018:1786 | REDHAT | Third Party Advisory |
RHSA-2018:2090 | https://access.redhat.com/errata/RHSA-2018:2090 | REDHAT | Third Party Advisory |
RHSA-2018:2089 | https://access.redhat.com/errata/RHSA-2018:2089 | REDHAT | Third Party Advisory |
RHSA-2018:2088 | https://access.redhat.com/errata/RHSA-2018:2088 | REDHAT | Third Party Advisory |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | CONFIRM | Patch |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us | CONFIRM | Third Party Advisory |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | CONFIRM | Patch |
1041890 | http://www.securitytracker.com/id/1041890 | SECTRACK | Third Party Advisory, VDB Entry |
RHSA-2018:2939 | https://access.redhat.com/errata/RHSA-2018:2939 | REDHAT | Third Party Advisory |
RHSA-2018:2938 | https://access.redhat.com/errata/RHSA-2018:2938 | REDHAT | Third Party Advisory |
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | CONFIRM | Patch, Third Party Advisory |
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html | MISC | Patch, Third Party Advisory |
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | MISC | Patch |
RHSA-2019:2858 | https://access.redhat.com/errata/RHSA-2019:2858 | REDHAT | |
RHSA-2019:3149 | https://access.redhat.com/errata/RHSA-2019:3149 | REDHAT | |
https://www.oracle.com/security-alerts/cpuoct2020.html | https://www.oracle.com/security-alerts/cpuoct2020.html | MISC | |
[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves | https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E | MLIST |