A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Information
Published : 2018-02-06 15:29
Updated : 2021-02-22 21:41
NVD link : CVE-2017-15095
Mitre link : CVE-2017-15095
JSON object : View
Products Affected
oracle
- communications_diameter_signaling_router
- utilities_advanced_spatial_and_operational_analytics
- jd_edwards_enterpriseone_tools
- communications_billing_and_revenue_management
- enterprise_manager_for_virtualization
- identity_manager
- global_lifecycle_management_opatchauto
- clusterware
- communications_instant_messaging_server
- database_server
- banking_platform
- webcenter_portal
- primavera_unifier
- financial_services_analytical_applications_infrastructure
debian
- debian_linux
redhat
- openshift_container_platform
- satellite
- satellite_capsule
- enterprise_linux
- jboss_enterprise_application_platform
fasterxml
- jackson-databind
netapp
- oncommand_balance
- oncommand_shift
- snapcenter
- oncommand_performance_manager
CWE
CWE-502
Deserialization of Untrusted Data
