Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-25649

Опубликовано: 09 янв. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.

Отчет

  • Red Hat Enterprise Linux 8 ships a vulnerable version of jackson-databind in the pki-deps:10.6 module. pki-deps:10.6 is for pki-core dependencies, but pki-core does not use the vulnerable DOMDeserializer class and thus has been set to low impact. Future updates may include fixed version of jackson-databind.
  • Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind code. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.
  • Red Hat Virtualization ships a vulnerable version of jackson-databind, however the vulnerable DOMDeserializer class is not used in the code, therefore reducing impact to low.
  • Red Hat OpenShift Container Platform (OCP) ships a vulnerable version of jackson-databind, but in the affected containers the DOMDeserializer class is not used. Additionally access to the containers is restricted to authenticated users only (OpenShift OAuth authentication) reducing the severity of this vulnerability to Low. In OCP 4 there are no plans to maintain ose-logging-elasticsearch5 container, hence marked as wontfix.
  • Red Hat Satellite ships affected version of jackson-databind through Candlepin, however, product code does not use DOMDeserializer class and jackson-databind in a vulnerable way. Thus impact has been set to low. A future release may update jackson-databind to a fixed version.
  • Red Hat Single Sign-On (RH-SSO) ships affected version of jackson-databind, however, none of the product code is using the affected class (DOMDeserializer). Thus impact has been set to low. RH-SSO will consume the fixed artifact from EAP in the next CP.

Меры по смягчению последствий

There is currently no known mitigation for this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2jackson-databindAffected
Red Hat BPM Suite 6jackson-databindOut of support scope
Red Hat build of Quarkusjackson-databindAffected
Red Hat CodeReady Studio 12jackson-databindAffected
Red Hat Data Grid 8jackson-databindNot affected
Red Hat Enterprise Linux 8pki-deps:10.6/jackson-databindFix deferred
Red Hat Enterprise Linux 9jackson-databindNot affected
Red Hat Fuse 7jackson-databindAffected
Red Hat Integration Camel K 1jackson-databindAffected
Red Hat JBoss A-MQ 6jackson-databindOut of support scope

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=1887664jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)

EPSS

Процентиль: 1%
0.00011
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.

CVSS3: 7.5
nvd
больше 4 лет назад

A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.

CVSS3: 7.5
debian
больше 4 лет назад

A flaw was found in FasterXML Jackson Databind, where it did not have ...

CVSS3: 7.5
github
больше 4 лет назад

XML External Entity (XXE) Injection in Jackson Databind

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость компонента DOMDeserializer библиотеки FasterXML jackson-databind, позволяющая нарушителю проводить XXE-атаки

EPSS

Процентиль: 1%
0.00011
Низкий

7.5 High

CVSS3