Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17485

Опубликовано: 10 янв. 2018
Источник: debian
EPSS Высокий

Описание

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jackson-databindfixed2.9.4-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1528565#c0

  • https://github.com/FasterXML/jackson-databind/issues/1855

EPSS

Процентиль: 99%
0.79787
Высокий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

CVSS3: 8.1
redhat
около 8 лет назад

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

CVSS3: 9.8
nvd
около 8 лет назад

FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

CVSS3: 9.8
github
больше 7 лет назад

jackson-databind vulnerable to remote code execution due to incorrect deserialization and blocklist bypass

CVSS3: 9.8
fstec
около 8 лет назад

Уязвимость метода readValue класса ObjectMapper библиотеки Jackson-databind, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 99%
0.79787
Высокий