View all vulnerabilities

CVE-2018-12022

jackson-databind Deserialization of Untrusted Data vulnerability

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Versions
com.fasterxml.jackson.core:jackson-databind < 2.7.9.4; com.fasterxml.jackson.core:jackson-databind >= 2.8.0 < 2.8.11.2; com.fasterxml.jackson.core:jackson-databind >= 2.9.0 < 2.9.6
Severity
High
Ecosystem
Publish Date
March 25, 2019
Modified Date
March 11, 2024