A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Information
Published : 2018-02-06 07:29
Updated : 2022-10-25 13:21
NVD link : CVE-2017-15095
Mitre link : CVE-2017-15095
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
oracle
- primavera_unifier
- communications_diameter_signaling_router
- financial_services_analytical_applications_infrastructure
- communications_instant_messaging_server
- utilities_advanced_spatial_and_operational_analytics
- database_server
- identity_manager
- global_lifecycle_management_opatchauto
- banking_platform
- jd_edwards_enterpriseone_tools
- webcenter_portal
- enterprise_manager_for_virtualization
- communications_billing_and_revenue_management
- clusterware
redhat
- jboss_enterprise_application_platform
- satellite
- enterprise_linux
- satellite_capsule
- openshift_container_platform
netapp
- oncommand_balance
- oncommand_performance_manager
- snapcenter
- oncommand_shift
fasterxml
- jackson-databind
debian
- debian_linux