Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-12384

Опубликовано: 21 июн. 2019
Источник: redhat
CVSS3: 8.1
EPSS Средний

Описание

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as enableDefaultTyping() or when @JsonTypeInfo is using Id.CLASS or Id.MINIMAL_CLASS or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.

Отчет

Red Hat OpenStack's OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected. This vulnerability relies on logback-core (ch.qos.logback.core) being present in the application's ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability. This issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.

Меры по смягчению последствий

The following conditions are needed for an exploit, we recommend avoiding all if possible:

  • Deserialization from sources you do not control
  • enableDefaultTyping()
  • @JsonTypeInfo using id.CLASSorid.MINIMAL_CLASS`

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6jackson-databindOut of support scope
Red Hat JBoss A-MQ 6jackson-databindNot affected
Red Hat JBoss Enterprise Application Platform 6jackson-databindNot affected
Red Hat Mobile Application Platform 4jackson-databindNot affected
Red Hat OpenShift Application Runtimesjackson-databindAffected
Red Hat OpenShift Container Platform 3.10elasticsearch-cloud-kubernetesAffected
Red Hat OpenShift Container Platform 3.10openshift-elasticsearch-pluginAffected
Red Hat OpenShift Container Platform 3.6elasticsearch-cloud-kubernetesOut of support scope
Red Hat OpenShift Container Platform 3.6openshift-elasticsearch-pluginOut of support scope
Red Hat OpenShift Container Platform 3.7elasticsearch-cloud-kubernetesOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1725807jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution

EPSS

Процентиль: 98%
0.51675
Средний

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 6 лет назад

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

CVSS3: 5.9
nvd
почти 6 лет назад

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

CVSS3: 5.9
debian
почти 6 лет назад

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to ...

rocky
почти 6 лет назад

Important: pki-deps:10.6 security update

CVSS3: 5.9
github
почти 6 лет назад

Deserialization of Untrusted Data in FasterXML jackson-databind

EPSS

Процентиль: 98%
0.51675
Средний

8.1 High

CVSS3