Description
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
Published: 2019-01-02
Score: 9.8 Critical
EPSS: 2.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1703-1 jackson-databind security update
Debian DSA Debian DSA DSA-4452-1 jackson-databind security update
EUVD EUVD EUVD-2019-0191 FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
Github GHSA Github GHSA GHSA-mx9v-gmh4-mgqw Deserialization of Untrusted Data in jackson-databind
Ubuntu USN Ubuntu USN USN-4813-1 Jackson Databind vulnerabilities
References
Link Providers
http://www.securityfocus.com/bid/107985 cve-icon cve-icon
https://access.redhat.com/errata/RHBA-2019:0959 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0782 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0877 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1782 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1797 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1822 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1823 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2804 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2858 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3002 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3140 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3149 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3892 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:4037 cve-icon cve-icon
https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b cve-icon cve-icon
https://github.com/FasterXML/jackson-databind/issues/2186 cve-icon cve-icon
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8 cve-icon cve-icon
https://issues.apache.org/jira/browse/TINKERPOP-2121 cve-icon cve-icon
https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3%40%3Cdevnull.infra.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-19361 cve-icon
https://seclists.org/bugtraq/2019/May/68 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190530-0003/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-19361 cve-icon
https://www.debian.org/security/2019/dsa-4452 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html cve-icon cve-icon
History

No history.

Subscriptions

Debian Debian Linux
Fasterxml Jackson-databind
Oracle Business Process Management Suite Primavera P6 Enterprise Project Portfolio Management Primavera Unifier Retail Workforce Management Software Webcenter Portal
Redhat Automation Manager Decision Manager Jboss Bpm Suite Jboss Bpms Jboss Brms Jboss Data Grid Jboss Data Virtualization Jboss Enterprise Application Platform Cd Jboss Enterprise Brms Platform Jboss Fuse Logging Openshift Openshift Application Runtimes Openshift Container Platform Rhel Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:37:11.520Z

Reserved: 2018-11-19T00:00:00.000Z

Link: CVE-2018-19361

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-02T18:29:00.827

Modified: 2024-11-21T03:57:48.437

Link: CVE-2018-19361

cve-icon Redhat

Severity : Important

Publid Date: 2018-11-18T00:00:00Z

Links: CVE-2018-19361 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses