CVE-2018-11307
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
Se detectó un problema en jackson-databind versiones 2.0.0 hasta 2.9.5 de FasterXML. El uso de escritura predeterminada de Jackson junto con una clase de gadget de iBatis permite la exfiltración de contenido. Se corrigió en las versiones 2.7.9.4, 2.8.11.2 y 2.9.6.
A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using MyBatis classes when using DefaultTyping. An attacker could use this flaw to achieve content exfiltration and possibly conduct further attacks.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-05-18 CVE Reserved
- 2019-04-17 CVE Published
- 2024-07-02 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (23)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | 2024-04-03 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:1822 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:1823 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:2804 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:2858 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:3002 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:3140 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:3149 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:3892 | 2024-04-03 | |
https://access.redhat.com/errata/RHSA-2019:4037 | 2024-04-03 | |
https://access.redhat.com/security/cve/CVE-2018-11307 | 2019-12-02 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1677341 | 2019-12-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Openshift Container Platform Search vendor "Redhat" for product "Openshift Container Platform" | 4.1 Search vendor "Redhat" for product "Openshift Container Platform" and version "4.1" | - |
Affected
| in | Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Safe
|
Fasterxml Search vendor "Fasterxml" | Jackson-databind Search vendor "Fasterxml" for product "Jackson-databind" | >= 2.0.0 < 2.6.7.3 Search vendor "Fasterxml" for product "Jackson-databind" and version " >= 2.0.0 < 2.6.7.3" | - |
Affected
| ||||||
Fasterxml Search vendor "Fasterxml" | Jackson-databind Search vendor "Fasterxml" for product "Jackson-databind" | >= 2.7.0 < 2.7.9.4 Search vendor "Fasterxml" for product "Jackson-databind" and version " >= 2.7.0 < 2.7.9.4" | - |
Affected
| ||||||
Fasterxml Search vendor "Fasterxml" | Jackson-databind Search vendor "Fasterxml" for product "Jackson-databind" | >= 2.8.0 < 2.8.11.2 Search vendor "Fasterxml" for product "Jackson-databind" and version " >= 2.8.0 < 2.8.11.2" | - |
Affected
| ||||||
Fasterxml Search vendor "Fasterxml" | Jackson-databind Search vendor "Fasterxml" for product "Jackson-databind" | >= 2.9.0 < 2.9.6 Search vendor "Fasterxml" for product "Jackson-databind" and version " >= 2.9.0 < 2.9.6" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Container Platform Search vendor "Redhat" for product "Openshift Container Platform" | 3.11 Search vendor "Redhat" for product "Openshift Container Platform" and version "3.11" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Clusterware Search vendor "Oracle" for product "Clusterware" | 12.1.0.2.0 Search vendor "Oracle" for product "Clusterware" and version "12.1.0.2.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Communications Instant Messaging Server Search vendor "Oracle" for product "Communications Instant Messaging Server" | 10.0.1.2.0 Search vendor "Oracle" for product "Communications Instant Messaging Server" and version "10.0.1.2.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Global Lifecycle Management Opatch Search vendor "Oracle" for product "Global Lifecycle Management Opatch" | < 11.2.0.3.23 Search vendor "Oracle" for product "Global Lifecycle Management Opatch" and version " < 11.2.0.3.23" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Global Lifecycle Management Opatch Search vendor "Oracle" for product "Global Lifecycle Management Opatch" | >= 12.2.0.1.0 < 12.2.0.1.19 Search vendor "Oracle" for product "Global Lifecycle Management Opatch" and version " >= 12.2.0.1.0 < 12.2.0.1.19" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Global Lifecycle Management Opatch Search vendor "Oracle" for product "Global Lifecycle Management Opatch" | >= 13.9.4.0.0 < 13.9.4.2.1 Search vendor "Oracle" for product "Global Lifecycle Management Opatch" and version " >= 13.9.4.0.0 < 13.9.4.2.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Retail Customer Management And Segmentation Foundation Search vendor "Oracle" for product "Retail Customer Management And Segmentation Foundation" | 17.0 Search vendor "Oracle" for product "Retail Customer Management And Segmentation Foundation" and version "17.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Utilities Advanced Spatial And Operational Analytics Search vendor "Oracle" for product "Utilities Advanced Spatial And Operational Analytics" | 2.7.0.1 Search vendor "Oracle" for product "Utilities Advanced Spatial And Operational Analytics" and version "2.7.0.1" | - |
Affected
|