First published: Thu Feb 22 2018(Updated: )
The jackson-databind package provides general data-binding functionality for Jackson, which works on top of Jackson core streaming API.<br>Security Fix(es):<br><li> A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. (CVE-2017-7525)</li> <li> Further classes that an attacker could use to achieve code execution through deserialisation were discovered, and added to the blacklist introduced by CVE-2017-7525. (CVE-2017-15095, CVE-2017-17485)</li> Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525 and CVE-2017-15095 and 0c0c0f from 360观星实验室 for reporting CVE-2017-17485.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven35-jackson-databind | <2.7.6-2.4.el7 | 2.7.6-2.4.el7 |
redhat/rh-maven35-jackson-databind | <2.7.6-2.4.el7 | 2.7.6-2.4.el7 |
redhat/rh-maven35-jackson-databind-javadoc | <2.7.6-2.4.el7 | 2.7.6-2.4.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2018:0342 is critical due to a deserialization flaw in jackson-databind that can allow unauthorized code execution.
To fix RHSA-2018:0342, upgrade jackson-databind to version 2.7.6-2.4.el7 or later.
RHSA-2018:0342 affects the rh-maven35-jackson-databind package in versions prior to 2.7.6-2.4.el7.
Yes, RHSA-2018:0342 is vulnerable to remote attacks, as it allows unauthenticated users to exploit the deserialization flaw.
Failure to address RHSA-2018:0342 may result in unauthorized access and execution of arbitrary code on the affected systems.