Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

github insights security alert - jackson remote code execution #8

Open
elmozgo opened this issue Oct 16, 2018 · 0 comments
Open

github insights security alert - jackson remote code execution #8

elmozgo opened this issue Oct 16, 2018 · 0 comments
Labels

Comments

@elmozgo
Copy link
Owner

elmozgo commented Oct 16, 2018

Remediation

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.8.11.1 or later. For example:

com.fasterxml.jackson.core jackson-databind [2.8.11.1,)

Always verify the validity and compatibility of suggestions with your codebase.
Details
CVE-2018-7489 More information
high severity
Vulnerable versions: < 2.8.11.1
Patched version: 2.8.11.1

FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
CVE-2017-7525 More information
high severity
Vulnerable versions: < 2.6.7.1
Patched version: 2.6.7.1

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

@elmozgo elmozgo added the bug label Oct 16, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant