CVE-2017-7525

HIGH

Description

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

References

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

http://www.securityfocus.com/bid/99623

http://www.securitytracker.com/id/1039744

http://www.securitytracker.com/id/1039947

http://www.securitytracker.com/id/1040360

https://access.redhat.com/errata/RHSA-2017:1834

https://access.redhat.com/errata/RHSA-2017:1835

https://access.redhat.com/errata/RHSA-2017:1836

https://access.redhat.com/errata/RHSA-2017:1837

https://access.redhat.com/errata/RHSA-2017:1839

https://access.redhat.com/errata/RHSA-2017:1840

https://access.redhat.com/errata/RHSA-2017:2477

https://access.redhat.com/errata/RHSA-2017:2546

https://access.redhat.com/errata/RHSA-2017:2547

https://access.redhat.com/errata/RHSA-2017:2633

https://access.redhat.com/errata/RHSA-2017:2635

https://access.redhat.com/errata/RHSA-2017:2636

https://access.redhat.com/errata/RHSA-2017:2637

https://access.redhat.com/errata/RHSA-2017:2638

https://access.redhat.com/errata/RHSA-2017:3141

https://access.redhat.com/errata/RHSA-2017:3454

https://access.redhat.com/errata/RHSA-2017:3455

https://access.redhat.com/errata/RHSA-2017:3456

https://access.redhat.com/errata/RHSA-2017:3458

https://access.redhat.com/errata/RHSA-2018:0294

https://access.redhat.com/errata/RHSA-2018:0342

https://access.redhat.com/errata/RHSA-2018:1449

https://access.redhat.com/errata/RHSA-2018:1450

https://bugzilla.redhat.com/show_bug.cgi?id=1462702

https://cwiki.apache.org/confluence/display/WW/S2-055

https://github.com/FasterXML/jackson-databind/issues/1599

https://github.com/FasterXML/jackson-databind/issues/1723

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://security.netapp.com/advisory/ntap-20171214-0002/

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us

https://www.debian.org/security/2017/dsa-4004

https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Details

Source: MITRE

Published: 2018-02-06

Updated: 2019-04-08

Type: CWE-502

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL