First published: Thu Jan 18 2018(Updated: )
A deserialization flaw was discovered in the jackson-databind that could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaws CVE-2017-7525 and CVE-2017-17485 by blacklisting more classes that could be used maliciously.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-activemq-artemis | <0:1.5.5.009-1.redhat_1.1.ep7.el6 | 0:1.5.5.009-1.redhat_1.1.ep7.el6 |
redhat/eap7-apache-cxf | <0:3.1.13-1.redhat_1.1.ep7.el6 | 0:3.1.13-1.redhat_1.1.ep7.el6 |
redhat/eap7-glassfish-jsf | <0:2.2.13-6.SP5_redhat_1.1.ep7.el6 | 0:2.2.13-6.SP5_redhat_1.1.ep7.el6 |
redhat/eap7-hibernate | <0:5.1.12-1.Final_redhat_1.1.ep7.el6 | 0:5.1.12-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-infinispan | <0:8.2.9-1.Final_redhat_1.1.ep7.el6 | 0:8.2.9-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-ironjacamar | <0:1.4.7-1.Final_redhat_1.1.ep7.el6 | 0:1.4.7-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-jackson-annotations | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-core | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-databind | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-jaxrs-providers | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-module-jaxb-annotations | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jackson-modules-java8 | <0:2.8.11-1.redhat_1.1.ep7.el6 | 0:2.8.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-jboss-logmanager | <0:2.0.8-1.Final_redhat_1.1.ep7.el6 | 0:2.0.8-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-jboss-server-migration | <0:1.0.3-6.Final_redhat_6.1.ep7.el6 | 0:1.0.3-6.Final_redhat_6.1.ep7.el6 |
redhat/eap7-jbossws-cxf | <0:5.1.10-1.Final_redhat_1.1.ep7.el6 | 0:5.1.10-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-narayana | <0:5.5.31-1.Final_redhat_1.1.ep7.el6 | 0:5.5.31-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-picketlink-bindings | <0:2.5.5-10.SP9_redhat_1.1.ep7.el6 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el6 |
redhat/eap7-picketlink-federation | <0:2.5.5-10.SP9_redhat_1.1.ep7.el6 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el6 |
redhat/eap7-resteasy | <0:3.0.25-1.Final_redhat_1.1.ep7.el6 | 0:3.0.25-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-undertow | <0:1.4.18-4.SP2_redhat_1.1.ep7.el6 | 0:1.4.18-4.SP2_redhat_1.1.ep7.el6 |
redhat/eap7-undertow-jastow | <0:2.0.3-1.Final_redhat_1.1.ep7.el6 | 0:2.0.3-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly | <0:7.1.1-4.GA_redhat_2.1.ep7.el6 | 0:7.1.1-4.GA_redhat_2.1.ep7.el6 |
redhat/eap7-wildfly-elytron | <0:1.1.8-1.Final_redhat_1.1.ep7.el6 | 0:1.1.8-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly-http-client | <0:1.0.9-1.Final_redhat_1.1.ep7.el6 | 0:1.0.9-1.Final_redhat_1.1.ep7.el6 |
redhat/eap7-wildfly-javadocs | <0:7.1.1-3.GA_redhat_2.1.ep7.el6 | 0:7.1.1-3.GA_redhat_2.1.ep7.el6 |
redhat/eap7-wss4j | <0:2.1.11-1.redhat_1.1.ep7.el6 | 0:2.1.11-1.redhat_1.1.ep7.el6 |
redhat/eap7-xml-security | <0:2.0.9-1.redhat_1.1.ep7.el6 | 0:2.0.9-1.redhat_1.1.ep7.el6 |
redhat/eap7-jboss-ec2-eap | <0:7.1.1-3.1.GA_redhat_3.ep7.el6 | 0:7.1.1-3.1.GA_redhat_3.ep7.el6 |
redhat/eap7-activemq-artemis | <0:1.5.5.009-1.redhat_1.1.ep7.el7 | 0:1.5.5.009-1.redhat_1.1.ep7.el7 |
redhat/eap7-apache-cxf | <0:3.1.13-1.redhat_1.1.ep7.el7 | 0:3.1.13-1.redhat_1.1.ep7.el7 |
redhat/eap7-glassfish-jsf | <0:2.2.13-6.SP5_redhat_1.1.ep7.el7 | 0:2.2.13-6.SP5_redhat_1.1.ep7.el7 |
redhat/eap7-hibernate | <0:5.1.12-1.Final_redhat_1.1.ep7.el7 | 0:5.1.12-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-infinispan | <0:8.2.9-1.Final_redhat_1.1.ep7.el7 | 0:8.2.9-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-ironjacamar | <0:1.4.7-1.Final_redhat_1.1.ep7.el7 | 0:1.4.7-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-jackson-annotations | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-core | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-databind | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-jaxrs-providers | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-module-jaxb-annotations | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jackson-modules-java8 | <0:2.8.11-1.redhat_1.1.ep7.el7 | 0:2.8.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-jboss-logmanager | <0:2.0.8-1.Final_redhat_1.1.ep7.el7 | 0:2.0.8-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-jboss-server-migration | <0:1.0.3-6.Final_redhat_6.1.ep7.el7 | 0:1.0.3-6.Final_redhat_6.1.ep7.el7 |
redhat/eap7-jbossws-cxf | <0:5.1.10-1.Final_redhat_1.1.ep7.el7 | 0:5.1.10-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-narayana | <0:5.5.31-1.Final_redhat_1.1.ep7.el7 | 0:5.5.31-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-picketlink-bindings | <0:2.5.5-10.SP9_redhat_1.1.ep7.el7 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el7 |
redhat/eap7-picketlink-federation | <0:2.5.5-10.SP9_redhat_1.1.ep7.el7 | 0:2.5.5-10.SP9_redhat_1.1.ep7.el7 |
redhat/eap7-resteasy | <0:3.0.25-1.Final_redhat_1.1.ep7.el7 | 0:3.0.25-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-undertow | <0:1.4.18-4.SP2_redhat_1.1.ep7.el7 | 0:1.4.18-4.SP2_redhat_1.1.ep7.el7 |
redhat/eap7-undertow-jastow | <0:2.0.3-1.Final_redhat_1.1.ep7.el7 | 0:2.0.3-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly | <0:7.1.1-4.GA_redhat_2.1.ep7.el7 | 0:7.1.1-4.GA_redhat_2.1.ep7.el7 |
redhat/eap7-wildfly-elytron | <0:1.1.8-1.Final_redhat_1.1.ep7.el7 | 0:1.1.8-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly-http-client | <0:1.0.9-1.Final_redhat_1.1.ep7.el7 | 0:1.0.9-1.Final_redhat_1.1.ep7.el7 |
redhat/eap7-wildfly-javadocs | <0:7.1.1-3.GA_redhat_2.1.ep7.el7 | 0:7.1.1-3.GA_redhat_2.1.ep7.el7 |
redhat/eap7-wss4j | <0:2.1.11-1.redhat_1.1.ep7.el7 | 0:2.1.11-1.redhat_1.1.ep7.el7 |
redhat/eap7-xml-security | <0:2.0.9-1.redhat_1.1.ep7.el7 | 0:2.0.9-1.redhat_1.1.ep7.el7 |
redhat/eap7-jboss-ec2-eap | <0:7.1.1-3.1.GA_redhat_3.ep7.el7 | 0:7.1.1-3.1.GA_redhat_3.ep7.el7 |
debian/jackson-databind | <=2.9.1-1<=2.8.6-1+deb9u2<=2.4.2-2+deb8u2 | 2.9.4-1 2.8.6-1+deb9u3 2.4.2-2+deb8u3 |
debian/jackson-databind | 2.9.8-3+deb10u3 2.9.8-3+deb10u5 2.12.1-1+deb11u1 2.14.0-1 | |
redhat/jackson-databind | <2.9.4 | 2.9.4 |
maven/com.fasterxml.jackson.core:jackson-databind | <2.7.9.5 | 2.7.9.5 |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.8.0<2.8.11 | 2.8.11.1 |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.9.0<2.9.4 | 2.9.4 |
FasterXML jackson-databind | >=2.0.0<2.6.7.3 | |
FasterXML jackson-databind | >=2.7.0<2.7.9.2 | |
FasterXML jackson-databind | >=2.8.0<2.8.11.1 | |
FasterXML jackson-databind | >=2.9.0<2.9.4 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
redhat openshift container platform | =4.1 | |
Red Hat Enterprise Virtualization | =4.0 | |
redhat virtualization host | =4.0 | |
redhat enterprise Linux server | =7.0 | |
redhat jboss enterprise application platform | =7.1 | |
redhat enterprise Linux server | =6.0 | |
redhat openshift container platform | =3.11 | |
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.3 | |
NetApp E-Series SANtricity Web Services Proxy | ||
NetApp OnCommand Shift | ||
All of | ||
Any of | ||
redhat openshift container platform | =4.1 | |
Red Hat Enterprise Virtualization | =4.0 | |
redhat virtualization host | =4.0 | |
redhat enterprise Linux server | =7.0 | |
All of | ||
redhat jboss enterprise application platform | =7.1 | |
Any of | ||
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
IBM Engineering Lifecycle Management | <=6.0.6.1 | |
IBM Engineering Lifecycle Management | <=6.0.6 | |
IBM Engineering Lifecycle Management | <=6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-5968 is considered critical due to its potential for arbitrary code execution.
To remediate CVE-2018-5968, update the affected software packages to the recommended versions listed in the vulnerability advisory.
CVE-2018-5968 affects various Red Hat packages, including eap7-jackson-databind and others in the JBoss ecosystem.
Yes, CVE-2018-5968 can be exploited by an unauthenticated user sending crafted input to vulnerable applications.
CVE-2018-5968 is a deserialization vulnerability in the Jackson Databind component.