First published: Sun Oct 02 2022(Updated: )
A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jackson-databind | <=2.9.8-3+deb10u3 | 2.9.8-3+deb10u5 2.12.1-1+deb11u1 2.14.0-1 |
redhat/jenkins | <2-plugins-0:4.11.1686831822-1.el8 | 2-plugins-0:4.11.1686831822-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1675702407-1.el8 | 2-plugins-0:4.12.1675702407-1.el8 |
redhat/eap7-jackson-databind | <0:2.12.7-1.redhat_00003.1.el8ea | 0:2.12.7-1.redhat_00003.1.el8ea |
redhat/eap7-jackson-databind | <0:2.12.7-1.redhat_00003.1.el9ea | 0:2.12.7-1.redhat_00003.1.el9ea |
redhat/eap7-jackson-databind | <0:2.12.7-1.redhat_00003.1.el7ea | 0:2.12.7-1.redhat_00003.1.el7ea |
redhat/candlepin | <0:4.2.13-1.el8 | 0:4.2.13-1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el7 | 0:18.0.6-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el8 | 0:18.0.6-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.6-1.redhat_00001.1.el9 | 0:18.0.6-1.redhat_00001.1.el9 |
FasterXML jackson-databind | <2.12.7.1 | |
FasterXML jackson-databind | >=2.13.0<2.13.4 | |
Quarkus Quarkus | <2.13.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
NetApp OnCommand Workflow Automation | ||
maven/com.fasterxml.jackson.core:jackson-databind | >=2.13.0<2.13.4 | 2.13.4 |
maven/com.fasterxml.jackson.core:jackson-databind | <2.12.7.1 | 2.12.7.1 |
IBM Cognos Command Center | <=10.2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-42004 is a vulnerability in FasterXML jackson-databind that allows an attacker to exhaust system resources due to a lack of a check in BeanDeserializer._deserializeFromArray.
CVE-2022-42004 can impact an application by allowing an attacker to exploit deeply nested arrays, leading to resource exhaustion.
CVE-2022-42004 has a severity rating of high (7 out of 10).
To fix CVE-2022-42004, upgrade to FasterXML jackson-databind version 2.13.4 or later.
More information about CVE-2022-42004 can be found on the CVE website (https://www.cve.org/CVERecord?id=CVE-2022-42004) and the NVD website (https://nvd.nist.gov/vuln/detail/CVE-2022-42004).