CVE-2019-12384

MEDIUM

Description

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

References

https://access.redhat.com/errata/RHSA-2019:1820

https://access.redhat.com/errata/RHSA-2019:2720

https://access.redhat.com/errata/RHSA-2019:2858

https://access.redhat.com/errata/RHSA-2019:2935

https://access.redhat.com/errata/RHSA-2019:2936

https://access.redhat.com/errata/RHSA-2019:2937

https://access.redhat.com/errata/RHSA-2019:2938

https://access.redhat.com/errata/RHSA-2019:2998

https://access.redhat.com/errata/RHSA-2019:3149

https://access.redhat.com/errata/RHSA-2019:3200

https://access.redhat.com/errata/RHSA-2019:3292

https://access.redhat.com/errata/RHSA-2019:3297

https://blog.doyensec.com/2019/07/22/jackson-gadgets.html

https://doyensec.com/research.html

https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.cassandra.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.drill.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.struts.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.drill.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cnotifications.geode.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E

https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e[email protected]%3Cissues.drill.apache.org%3E

https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/

https://lists.fedoraproject.org/archives/list/[email protected]/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/

https://lists.fedoraproject.org/archives/list/[email protected]/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/

https://seclists.org/bugtraq/2019/Oct/6

https://security.netapp.com/advisory/ntap-20190703-0002/

https://www.debian.org/security/2019/dsa-4542

https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Details

Source: MITRE

Published: 2019-06-24

Updated: 2019-09-05

Type: CWE-502

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM