[FOLIO-1682] Security vulnerability reported in jackson-databind >= 2.9.0, < 2.9.8 Created: 04/Jan/19 Updated: 03/Jun/20 Resolved: 14/Mar/19 |
|
| Status: | Closed |
| Project: | FOLIO |
| Components: | None |
| Affects versions: | None |
| Fix versions: | None |
| Type: | Umbrella | Priority: | P3 |
| Reporter: | Peter Murray | Assignee: | Unassigned |
| Resolution: | Done | Votes: | 0 |
| Labels: | core, security, sprint54 | ||
| Remaining Estimate: | Not Specified | ||
| Time Spent: | Not Specified | ||
| Original estimate: | Not Specified | ||
| Issue links: |
|
||||||||||||||||||||||||||||||||||||||||||||
| Sprint: | |||||||||||||||||||||||||||||||||||||||||||||
| Development Team: | Core: Platform | ||||||||||||||||||||||||||||||||||||||||||||
| Description |
RemediationUpgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.8 or later. For example: <dependency> <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> <version>[2.9.8,)</version> </dependency> Always verify the validity and compatibility of suggestions with your codebase. DetailsCVE-2018-19360 [More information](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)high severity *Vulnerable versions:* >= 2.9.0, < 2.9.8 *Patched version:* 2.9.8 FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization. CVE-2018-19362 [More information](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)high severity *Vulnerable versions:* >= 2.9.0, < 2.9.8 *Patched version:* 2.9.8 FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization. CVE-2018-19361 [More information](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)high severity *Vulnerable versions:* >= 2.9.0, < 2.9.8 *Patched version:* 2.9.8 FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization. |
| Comments |
| Comment by Julian Ladisch [ 05/Jan/19 ] |
|
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8 also fixes https://nvd.nist.gov/vuln/detail/CVE-2018-1000873 "DoS: Performance issue with malicious `BigDecimal` input, `InstantDeserializer`, `DurationDeserializer`" |