jackson-databind vulnerable to deserialization flaw leading to unauthenticated remote code execution
Critical severity
GitHub Reviewed
Published
Oct 18, 2018
to the GitHub Advisory Database
•
Updated Mar 15, 2024
Package
Affected versions
>= 2.9.0, < 2.9.4
>= 2.8.0, < 2.8.11
>= 2.0.0, < 2.6.7.3
>= 2.7.0, < 2.7.9.2
Patched versions
2.9.4
2.8.11
2.6.7.3
2.7.9.2
Description
Published by the National Vulnerability Database
Feb 6, 2018
Published to the GitHub Advisory Database
Oct 18, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 15, 2024
jackson-databind in versions prior to 2.8.11 and 2.9.4 contain a deserialization flaw which allows an unauthenticated user to perform code execution by sending maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525, blacklisting additonal vulnerable classes.
References