FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fasterxml Subscribe
Jackson-databind Subscribe
Banking Platform Subscribe
Communications Billing And Revenue Management Subscribe
Enterprise Manager For Virtualization Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Jdeveloper Subscribe
Primavera Unifier Subscribe
Retail Merchandising System Subscribe
Webcenter Portal Subscribe
Jboss Bpms Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Cd Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Jboss Single Sign On Subscribe
Logging Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe
Rhel Software Collections Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1703-1 jackson-databind security update
Debian DSA Debian DSA DSA-4452-1 jackson-databind security update
EUVD EUVD EUVD-2019-0181 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
Github GHSA Github GHSA GHSA-9mxf-g3x6-wv74 Server-Side Request Forgery (SSRF) in jackson-databind
Ubuntu USN Ubuntu USN USN-4813-1 Jackson Databind vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://access.redhat.com/errata/RHBA-2019:0959 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0782 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1106 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1107 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1108 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1140 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1822 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1823 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2858 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3149 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3892 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:4037 cve-icon cve-icon
https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44 cve-icon cve-icon
https://github.com/FasterXML/jackson-databind/issues/2097 cve-icon cve-icon
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7 cve-icon cve-icon
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-14721 cve-icon
https://seclists.org/bugtraq/2019/May/68 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190530-0003/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-14721 cve-icon
https://www.debian.org/security/2019/dsa-4452 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T09:38:13.150Z

Reserved: 2018-07-28T00:00:00

Link: CVE-2018-14721

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-02T18:29:00.543

Modified: 2024-11-21T03:49:40.523

Link: CVE-2018-14721

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-07-27T00:00:00Z

Links: CVE-2018-14721 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses