First published: Thu Jan 18 2018(Updated: )
A deserialization flaw was discovered in the jackson-databind that could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaws CVE-2017-7525 and CVE-2017-17485 by blacklisting more classes that could be used maliciously.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-activemq-artemis | <0:1.5.5.009-1.redhat_1.1.ep7.el6 | 0:1.5.5.009-1.redhat_1.1.ep7.el6 |
redhat/eap7-apache-cxf | <0:3.1.13-1.redhat_1.1.ep7.el6 | 0:3.1.13-1.redhat_1.1.ep7.el6 |
redhat/eap7-glassfish-jsf | <0:2.2.13-6.SP5_redhat_1.1.ep7.el6 | 0:2.2.13-6.SP5_redhat_1.1.ep7.el6 |
redhat/eap7-hibernate | <0:5.1.12-1.Final_redhat_1.1.ep7.el6 | 0:5.1.12-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-infinispan | <0:8.2.9-1.Final_redhat_1.1.ep7.el6 | 0:8.2.9-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-ironjacamar | <0:1.4.7-1.Final_redhat_1.1.ep7.el6 | 0:1.4.7-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-jackson-annotations | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-core | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-databind | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-jaxrs-providers | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-module-jaxb-annotations | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-modules-java8 | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jboss-logmanager | <0:2.0.8-1.Final_redhat_1.1.ep7.el6 | 0:2.0.8-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-jboss-server-migration | <0:1.0.3-6.Final_redhat_6.1.ep7.el6 | 0:1.0.3-6.Final_redhat_6.1.ep7.el6 |
redhat/eap7-jbossws-cxf | <0:5.1.10-1.Final_redhat_1.1.ep7.el6 | 0:5.1.10-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-narayana | <0:5.5.31-1.Final_redhat_1.1.ep7.el6 | 0:5.5.31-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-picketlink-bindings | <0:2.5.5-10.SP9_redhat_1.1.ep7.el6 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el6 |
redhat/eap7-picketlink-federation | <0:2.5.5-10.SP9_redhat_1.1.ep7.el6 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el6 |
redhat/eap7-resteasy | <0:3.0.25-1.Final_redhat_1.1.ep7.el6 | 0:3.0.25-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-undertow | <0:1.4.18-4.SP2_redhat_1.1.ep7.el6 | 0:1.4.18-4.SP2_redhat_1.1.ep7.el6 |
redhat/eap7-undertow-jastow | <0:2.0.3-1.Final_redhat_1.1.ep7.el6 | 0:2.0.3-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly | <0:7.1.1-4.GA_redhat_2.1.ep7.el6 | 0:7.1.1-4.GA_redhat_2.1.ep7.el6 |
redhat/eap7-wildfly-elytron | <0:1.1.8-1.Final_redhat_1.1.ep7.el6 | 0:1.1.8-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly-http-client | <0:1.0.9-1.Final_redhat_1.1.ep7.el6 | 0:1.0.9-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly-javadocs | <0:7.1.1-3.GA_redhat_2.1.ep7.el6 | 0:7.1.1-3.GA_redhat_2.1.ep7.el6 |
redhat/eap7-wss4j | <0:2.1.11-1.redhat_1.1.ep7.el6 | 0:2.1.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-xml-security | <0:2.0.9-1.redhat_1.1.ep7.el6 | 0:2.0.9-1.redhat_1.1.ep7.el6 |
redhat/eap7-jboss-ec2-eap | <0:7.1.1-3.1.GA_redhat_3.ep7.el6 | 0:7.1.1-3.1.GA_redhat_3.ep7.el6 |
redhat/eap7-activemq-artemis | <0:1.5.5.009-1.redhat_1.1.ep7.el7 | 0:1.5.5.009-1.redhat_1.1.ep7.el7 |
redhat/eap7-apache-cxf | <0:3.1.13-1.redhat_1.1.ep7.el7 | 0:3.1.13-1.redhat_1.1.ep7.el7 |
redhat/eap7-glassfish-jsf | <0:2.2.13-6.SP5_redhat_1.1.ep7.el7 | 0:2.2.13-6.SP5_redhat_1.1.ep7.el7 |
redhat/eap7-hibernate | <0:5.1.12-1.Final_redhat_1.1.ep7.el7 | 0:5.1.12-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-infinispan | <0:8.2.9-1.Final_redhat_1.1.ep7.el7 | 0:8.2.9-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-ironjacamar | <0:1.4.7-1.Final_redhat_1.1.ep7.el7 | 0:1.4.7-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-jackson-annotations | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-core | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-databind | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-jaxrs-providers | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-module-jaxb-annotations | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-modules-java8 | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jboss-logmanager | <0:2.0.8-1.Final_redhat_1.1.ep7.el7 | 0:2.0.8-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-jboss-server-migration | <0:1.0.3-6.Final_redhat_6.1.ep7.el7 | 0:1.0.3-6.Final_redhat_6.1.ep7.el7 |
redhat/eap7-jbossws-cxf | <0:5.1.10-1.Final_redhat_1.1.ep7.el7 | 0:5.1.10-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-narayana | <0:5.5.31-1.Final_redhat_1.1.ep7.el7 | 0:5.5.31-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-picketlink-bindings | <0:2.5.5-10.SP9_redhat_1.1.ep7.el7 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el7 |
redhat/eap7-picketlink-federation | <0:2.5.5-10.SP9_redhat_1.1.ep7.el7 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el7 |
redhat/eap7-resteasy | <0:3.0.25-1.Final_redhat_1.1.ep7.el7 | 0:3.0.25-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-undertow | <0:1.4.18-4.SP2_redhat_1.1.ep7.el7 | 0:1.4.18-4.SP2_redhat_1.1.ep7.el7 |
redhat/eap7-undertow-jastow | <0:2.0.3-1.Final_redhat_1.1.ep7.el7 | 0:2.0.3-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly | <0:7.1.1-4.GA_redhat_2.1.ep7.el7 | 0:7.1.1-4.GA_redhat_2.1.ep7.el7 |
redhat/eap7-wildfly-elytron | <0:1.1.8-1.Final_redhat_1.1.ep7.el7 | 0:1.1.8-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly-http-client | <0:1.0.9-1.Final_redhat_1.1.ep7.el7 | 0:1.0.9-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly-javadocs | <0:7.1.1-3.GA_redhat_2.1.ep7.el7 | 0:7.1.1-3.GA_redhat_2.1.ep7.el7 |
redhat/eap7-wss4j | <0:2.1.11-1.redhat_1.1.ep7.el7 | 0:2.1.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-xml-security | <0:2.0.9-1.redhat_1.1.ep7.el7 | 0:2.0.9-1.redhat_1.1.ep7.el7 |
redhat/eap7-jboss-ec2-eap | <0:7.1.1-3.1.GA_redhat_3.ep7.el7 | 0:7.1.1-3.1.GA_redhat_3.ep7.el7 |
debian/jackson-databind | <=2.9.1-1<=2.8.6-1+deb9u2<=2.4.2-2+deb8u2 | 2.9.4-1 2.8.6-1+deb9u3 2.4.2-2+deb8u3 |
debian/jackson-databind | 2.9.8-3+deb10u3 2.9.8-3+deb10u5 2.12.1-1+deb11u1 2.14.0-1 | |
redhat/jackson-databind | <2.9.4 | 2.9.4 |
maven/com.fasterxml.jackson.core:jackson-databind | <2.7.9.5 | 2.7.9.5 |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.8.0<2.8.11 | 2.8.11.1 |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.9.0<2.9.4 | 2.9.4 |
IBM Engineering Lifecycle Management | <=6.0.6.1 | |
IBM Engineering Lifecycle Management | <=6.0.6 | |
IBM Engineering Lifecycle Management | <=6.0.2 | |
FasterXML Jackson Databind | >=2.0.0<2.6.7.3 | |
FasterXML Jackson Databind | >=2.7.0<2.7.9.2 | |
FasterXML Jackson Databind | >=2.8.0<2.8.11.1 | |
FasterXML Jackson Databind | >=2.9.0<2.9.4 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Red Hat OpenShift Container Platform | =4.1 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Virtualization Host EUS | =4.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
JBoss Enterprise Application Platform | =7.1 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat OpenShift Container Platform | =3.11 | |
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.3 | |
NetApp E-Series SANtricity Web Services | ||
NetApp OnCommand Shift | ||
All of | ||
Any of | ||
Red Hat OpenShift Container Platform | =4.1 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Virtualization Host EUS | =4.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
All of | ||
JBoss Enterprise Application Platform | =7.1 | |
Any of | ||
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-5968 is considered critical due to its potential for arbitrary code execution.
To remediate CVE-2018-5968, update the affected software packages to the recommended versions listed in the vulnerability advisory.
CVE-2018-5968 affects various Red Hat packages, including eap7-jackson-databind and others in the JBoss ecosystem.
Yes, CVE-2018-5968 can be exploited by an unauthenticated user sending crafted input to vulnerable applications.
CVE-2018-5968 is a deserialization vulnerability in the Jackson Databind component.