Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-20190

Опубликовано: 19 янв. 2021
Источник: debian

Описание

A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jackson-databindfixed2.12.1-1package
jackson-databindfixed2.9.8-3+deb10u3busterpackage

Примечания

  • https://github.com/FasterXML/jackson-databind/issues/2854

  • Starting from 2.10 series mitigated as Safe Default Typing is enabled by default

  • but still an issue when Default Typing is enabled.

  • https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 5 лет назад

A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.1
redhat
около 5 лет назад

A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.1
nvd
около 5 лет назад

A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 8.1
github
около 5 лет назад

Deserialization of untrusted data in jackson-databind

CVSS3: 8.1
fstec
около 5 лет назад

Уязвимость библиотеки jackson-databind проекта FasterXML, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код