[FOLIO-1682] Security vulnerability reported in jackson-databind >= 2.9.0, < 2.9.8 Created: 04/Jan/19  Updated: 03/Jun/20  Resolved: 14/Mar/19

Status: Closed
Project: FOLIO
Components: None
Affects versions: None
Fix versions: None

Type: Umbrella Priority: P3
Reporter: Peter Murray Assignee: Unassigned
Resolution: Done Votes: 0
Labels: core, security, sprint54
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original estimate: Not Specified

Issue links:
Blocks
is blocked by CQLPG-76 Fix security vulnerabilities reported... Closed
is blocked by MODLOGSAML-39 Fix security vulnerabilities reported... Closed
is blocked by RMB-315 Fix security vulnerabilities in jacks... Closed
is blocked by FOLIO-1685 Backend modules using RMB should upda... Closed
is blocked by MODDATAIMP-64 Fix security vulnerabilities reported... Closed
is blocked by MODEMAIL-5 Fix security vulnerabilities reported... Closed
is blocked by MODEVENTC-4 Fix security vulnerabilities reported... Closed
Relates
relates to FOLIO-1580 Fix security vulnerabilities reported... Closed
relates to FOLIO-1683 Security vulnerability reported in ja... Closed
Sprint:
Development Team: Core: Platform

 Description   

Remediation

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.8 or later. For example:

<dependency>
 <groupId>com.fasterxml.jackson.core</groupId>
 <artifactId>jackson-databind</artifactId>
 <version>[2.9.8,)</version>
</dependency>

Always verify the validity and compatibility of suggestions with your codebase.

Details

CVE-2018-19360 [More information](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)

high severity

*Vulnerable versions:* >= 2.9.0, < 2.9.8

*Patched version:* 2.9.8

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.

CVE-2018-19362 [More information](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)

high severity

*Vulnerable versions:* >= 2.9.0, < 2.9.8

*Patched version:* 2.9.8

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.

CVE-2018-19361 [More information](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)

high severity

*Vulnerable versions:* >= 2.9.0, < 2.9.8

*Patched version:* 2.9.8

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.



 Comments   
Comment by Julian Ladisch [ 05/Jan/19 ]

https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8 also fixes https://nvd.nist.gov/vuln/detail/CVE-2018-1000873 "DoS: Performance issue with malicious `BigDecimal` input, `InstantDeserializer`, `DurationDeserializer`"

Generated at Thu Feb 08 23:15:07 UTC 2024 using Jira 1001.0.0-SNAPSHOT#100246-sha1:7a5c50119eb0633d306e14180817ddef5e80c75d.