8.1
CWE
502
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2018-12023

First published: Wed Jan 30 2019(Updated: )

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
FasterXML jackson-databind>=2.7.0<2.7.9.4
FasterXML jackson-databind>=2.8.0<2.8.11.2
FasterXML jackson-databind>=2.9.0<2.9.6
Debian Debian Linux=9.0
Fedoraproject Fedora=29
Oracle Jd Edwards Enterpriseone Tools=9.2
Oracle Retail Merchandising System=15.0
Redhat Automation Manager=7.3.1
Redhat Decision Manager=7.3.1
Redhat Jboss Brms=6.4.10
Redhat Jboss Enterprise Application Platform=7.2.0
Redhat Openshift Container Platform=3.11
Redhat Single Sign-on=7.3
debian/jackson-databind
2.9.8-3+deb10u3
2.9.8-3+deb10u5
2.12.1-1+deb11u1
2.14.0-1
IBM GDE<=3.0.0.2
redhat/jackson-databind<2.7.9.4
2.7.9.4
redhat/jackson-databind<2.8.11.2
2.8.11.2
redhat/jackson-databind<2.9.6
2.9.6
maven/com.fasterxml.jackson.core:jackson-databind>=2.9.0<2.9.6
2.9.6
maven/com.fasterxml.jackson.core:jackson-databind>=2.8.0<=2.8.11.1
2.8.11.2
maven/com.fasterxml.jackson.core:jackson-databind>=2.7.0<=2.7.9.3
2.7.9.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID for this issue?

    The vulnerability ID for this issue is CVE-2018-12023.

  • What is the severity level of CVE-2018-12023?

    CVE-2018-12023 has a severity level of 8.1 (High).

  • Which products are affected by CVE-2018-12023?

    CVE-2018-12023 affects multiple Oracle products and IBM Disconnected Log Collector.

  • What is the affected version of jackson-databind?

    The affected versions of jackson-databind are 2.7.9.4, 2.8.11.2, and 2.9.6.

  • Are there any remediation steps available?

    Yes, there are remediation steps available for jackson-databind. Please refer to the official sources for specific remediation steps.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203