A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fasterxml Subscribe
Jackson-databind Subscribe
Oncommand Balance Subscribe
Oncommand Performance Manager Subscribe
Oncommand Shift Subscribe
Snapcenter Subscribe
Banking Platform Subscribe
Clusterware Subscribe
Communications Billing And Revenue Management Subscribe
Communications Diameter Signaling Router Subscribe
Communications Instant Messaging Server Subscribe
Database Server Subscribe
Enterprise Manager For Virtualization Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Global Lifecycle Management Opatchauto Subscribe
Identity Manager Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Primavera Unifier Subscribe
Utilities Advanced Spatial And Operational Analytics Subscribe
Webcenter Portal Subscribe
Devtools Subscribe
Enterprise Linux Subscribe
Jboss Bpms Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe
Rhel Software Collections Subscribe
Satellite Subscribe
Satellite Capsule Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2091-1 libjackson-json-java security update
Debian DLA Debian DLA DLA-2342-1 libjackson-json-java security update
Debian DSA Debian DSA DSA-4037-1 jackson-databind security update
EUVD EUVD EUVD-2018-0610 A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
Github GHSA Github GHSA GHSA-h592-38cm-4ggp jackson-databind vulnerable to deserialization flaw leading to unauthenticated remote code execution
Ubuntu USN Ubuntu USN USN-4741-1 Jackson vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html cve-icon cve-icon
http://www.securityfocus.com/bid/103880 cve-icon cve-icon
http://www.securitytracker.com/id/1039769 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3189 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3190 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0342 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0478 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0479 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0480 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0481 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0576 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0577 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1447 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1448 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1449 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1450 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1451 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2927 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2858 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3149 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3892 cve-icon cve-icon
https://access.redhat.com/solutions/3442891 cve-icon
https://github.com/FasterXML/jackson-databind/issues/1680 cve-icon cve-icon
https://github.com/FasterXML/jackson-databind/issues/1737 cve-icon cve-icon
https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629%40%3Csolr-user.lucene.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2017-15095 cve-icon
https://security.netapp.com/advisory/ntap-20171214-0003/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2017-15095 cve-icon
https://www.debian.org/security/2017/dsa-4037 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
History

Fri, 23 Aug 2024 05:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:7::el7 cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-09-16T22:57:07.488Z

Reserved: 2017-10-08T00:00:00

Link: CVE-2017-15095

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-02-06T15:29:00.233

Modified: 2024-11-21T03:14:03.620

Link: CVE-2017-15095

cve-icon Redhat

Severity : Important

Publid Date: 2017-11-02T00:00:00Z

Links: CVE-2017-15095 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses