Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14195

Опубликовано: 14 июн. 2020
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).

A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

While OpenShift Container Platform's elasticsearch plugins do ship the vulnerable component, it doesn't do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release. Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. The PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release. The version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.

Меры по смягчению последствий

The following conditions are needed for an exploit, we recommend avoiding all if possible:

  • Deserialization from sources you do not control
  • enableDefaultTyping()
  • @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS
  • org.jsecurity.realm.jndi.JndiRealmFactory in classpath

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2jackson-databindNot affected
Red Hat BPM Suite 6jackson-databindOut of support scope
Red Hat build of Quarkusjackson-databindNot affected
Red Hat Data Grid 8jackson-databindNot affected
Red Hat Decision Manager 7jackson-databindWill not fix
Red Hat Enterprise Linux 8pki-deps:10.6/jackson-databindFix deferred
Red Hat Integration Camel K 1jackson-databindNot affected
Red Hat JBoss A-MQ 6jackson-databindOut of support scope
Red Hat JBoss BRMS 6jackson-databindOut of support scope
Red Hat JBoss Data Grid 6jackson-databindOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1848958jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory

EPSS

Процентиль: 92%
0.09511
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 5 лет назад

FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).

CVSS3: 8.1
nvd
около 5 лет назад

FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).

CVSS3: 8.1
debian
около 5 лет назад

FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interact ...

CVSS3: 8.1
github
около 5 лет назад

Deserialization of untrusted data in Jackson Databind

CVSS3: 8.1
fstec
около 5 лет назад

Уязвимость компонента org.jsecurity библиотеки Jackson-databind проекта FasterXML, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.09511
Низкий

8.1 High

CVSS3