com.fasterxml.jackson.core:jackson-databind@2.7.7 vulnerabilities

  • latest version

    2.18.2

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    20 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the com.fasterxml.jackson.core:jackson-databind package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Denial of Service (DoS)

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Denial of Service (DoS) in the _deserializeFromArray() function in BeanDeserializer, due to resource exhaustion when processing a deeply nested array.

    NOTE: For this vulnerability to be exploitable the non-default DeserializationFeature must be enabled.

    How to fix Denial of Service (DoS)?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.7.1, 2.13.4 or higher.

    [2.4.0,2.12.7.1)[2.13.0,2.13.4)
    • M
    Denial of Service (DoS)

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Denial of Service (DoS) in the _deserializeWrappedValue() function in StdDeserializer.java, due to resource exhaustion when processing deeply nested arrays.

    NOTE: This vulnerability is only exploitable when the non-default UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.

    How to fix Denial of Service (DoS)?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.7.1, 2.13.4.1 or higher.

    [2.4.0,2.12.7.1)[2.13.0,2.13.4.1)
    • H
    Denial of Service (DoS)

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Denial of Service (DoS) via a large depth of nested objects.

    How to fix Denial of Service (DoS)?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.6.1, 2.13.2.1 or higher.

    [,2.12.6.1)[2.13.0,2.13.2.1)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A malicious user could perform a SSRF attack via the javax.swing gadget (specifically javax.swing.JTextPane).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.7 or higher.

    [,2.9.10.7)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [2.0.0,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

    [,2.9.10.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to the class ignite-jta.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.6 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.6)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.6 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.6)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to conduct a Deserialization attack using the oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (apache/drill) class gadget if polymorphic type handling is enabled and an application using this package allows user input which gets deserialized.

    Note: This vulnerability does not affect release 2.10.0 onward.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.5)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to conduct a Deserialization attack using any of the following class gadget available within weblogic/oracle-aqjms if polymorphic type handling is enabled and an application using this package allows user input which gets deserialized.

    • oracle.jms.AQjmsQueueConnectionFactory
    • oracle.jms.AQjmsXATopicConnectionFactory
    • oracle.jms.AQjmsTopicConnectionFactory
    • oracle.jms.AQjmsXAQueueConnectionFactory
    • oracle.jms.AQjmsXAConnectionFactory

    Note: This vulnerability does not affect release 2.10.0 onward.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.5)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.5)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to conduct a Deserialization attack using the com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (xalan2) class gadget if polymorphic type handling is enabled and an application using this package allows user input which gets deserialized.

    Note: This vulnerability does not affect release 2.10.0 onward.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.5)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to gadget org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to gadgets org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to gadget org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to gadget javax.swing.JEditorPane.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.7.9.7, 2.8.11.6, 2.9.10.4 or higher.

    [2.0.0,2.6.7.4)[2.7.0,2.7.9.7)[2.8.0,2.8.11.6)[2.9.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to gadget org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [2.0.0,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).

    Note: This vulnerability does not affect release 2.10.0 onward.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [2.0.0,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).

    Note: This vulnerability does not affect release 2.10.0 onward.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

    [2.0.0,2.6.7.4)[2.7.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Mishandles the interaction between serialization gadgets and typing, related to:

    • com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap)
    • br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core)
    • org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config)

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.7.9.7, 2.8.11.6, 2.9.10.4 or higher.

    [,2.6.7.4)[2.7.0,2.7.9.7)[2.8.0,2.8.11.6)[2.9.0,2.9.10.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to an incomplete black list (incomplete fix for CVE-2017-7525). It lacks xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 or higher.

    [,2.6.7.4)[2.7.0,2.7.9.7)[2.8.0,2.8.11.5)[2.9.0,2.9.10.3)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Two additional net.sf.ehcache gadgets are not blacklisted.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.2 or higher.

    [,2.9.10.2)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. When Default Typing is enabled for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.1 or higher.

    [2.0.0,2.9.10.1)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10 or higher.

    [,2.9.10)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered as com.p6spy.engine.spy.P6DataSource was not blocked. An attacker could leverage this gadget type to perform Remote Code Execution attacks through deserialization.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.1, 2.8.11.5, 2.6.7.3 or higher.

    [2.9.0,2.9.10.1)[2.7.0,2.8.11.5)[,2.6.7.3)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered within org.apache.commons.dbcp.datasources.SharedPoolDataSource was not blocked. An attacker could leverage this gadget type to perform Remote Code Execution attacks through deserialization.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.1, 2.8.11.5, 2.6.7.3 or higher.

    [2.9.0,2.9.10.1)[2.7.0,2.8.11.5)[,2.6.7.3)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered as com.zaxxer.hikari.HikariDataSource was not blocked. Note: This is a different vulnerability than CVE-2019-14540.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10, 2.8.11.5, 2.6.7.3 or higher.

    [2.9.0,2.9.10)[2.7.0,2.8.11.5)[,2.6.7.3)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered as com.zaxxer.hikari.HikariConfig was not blocked. Note: This is a different vulnerability than CVE-2019-16335.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10, 2.8.11.5, 2.6.7.3 or higher.

    [2.9.0,2.9.10)[2.7.0,2.8.11.5)[,2.6.7.3)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.cxf.jaxrs.provider.XSLTJaxbProvider.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10, 2.8.11.5, 2.6.7.3 or higher.

    [2.9.0,2.9.10)[2.7.0,2.8.11.5)[,2.6.7.3)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. SubTypeValidator.java mishandles default typing when ehcache is used, leading to remote code execution.

    NOTE: This vulnerability has also been identified as: CVE-2019-14439

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.2, 2.8.11.4, 2.7.9.6 or higher.

    [2.9.0,2.9.9.2)[2.8.0,2.8.11.4)[,2.7.9.6)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. SubTypeValidator.java mishandles default typing when ehcache is used, leading to remote code execution.

    NOTE: This vulnerability has also been identified as: CVE-2019-14379

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.2, 2.8.11.4, 2.7.9.6 or higher.

    [2.9.0,2.9.9.2)[2.8.0,2.8.11.4)[,2.7.9.6)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data which allows attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.1, 2.8.11.4, 2.7.9.6 or higher.

    [2.9.0,2.9.9.1)[2.8.0,2.8.11.4)[,2.7.9.6)
    • M
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.1, 2.8.11.4, 2.7.9.6 or higher.

    [2.9.0,2.9.9.1)[2.8.0,2.8.11.4)[,2.7.9.6)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. When Default Typing is enabled for an externally exposed JSON endpoint, the service has the mysql-connector-java jar in the classpath. An attacker can host a crafted MySQL server reachable by the victim and send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs due to missing com.mysql.cj.jdbc.admin.MiniAdmin validation.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 or higher.

    [2.9.0,2.9.9)[2.8.0,2.8.11.4)[2.7.0,2.7.9.6)[,2.6.7.3)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attacks due to not blocking the axis2-transport-jms class from polymorphic deserialization.

    Note This vulnerability (CVE-2018-19360) is not identical to CVE-2018-19362 and CVE-2018-19361.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.8 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.5)[2.8.0,2.8.11.3)[2.9.0,2.9.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attacks due to not blocking the jboss-common-core class from polymorphic deserialization.

    Note This vulnerability (CVE-2018-19362) is not identical to CVE-2018-19360 and CVE-2018-19361.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.8 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.5)[2.8.0,2.8.11.3)[2.9.0,2.9.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attacks due to not blocking the axis2-transport-jms class from polymorphic deserialization.

    Note This vulnerability (CVE-2018-19361) is not identical to CVE-2018-19362 and CVE-2018-19360.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.8 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.5)[2.8.0,2.8.11.3)[2.9.0,2.9.8)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A malicious user could perform a SSRF attack via the axis2-jaxws gadget due to an incomplete fix for the CVE-2017-7525 deserialization flaw.

    Note: This vulnerability (CVE-2018-14721) is not identical to CVE-2018-12018, CVE-2018-14719, CVE-2018-14720, CVE-2018-14722,CVE-2018-12023 and CVE-2018-11307.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.7 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.5)[2.8.0,2.8.11.3)[2.9.0,2.9.7)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attack via the blaze-ds-opt gadget due to an incomplete fix for the CVE-2017-7525 deserialization flaw.

    Note: This vulnerability (CVE-2018-14719) is not identical to CVE-2018-12018, CVE-2018-14720, CVE-2018-14721, CVE-2018-14722,CVE-2018-12023 and CVE-2018-11307.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.7 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.5)[2.8.0,2.8.11.3)[2.9.0,2.9.7)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attacks via the slf4j-ext gadget due to an incomplete fix for the CVE-2017-7525 deserialization flaw.

    Note: This vulnerability (CVE-2018-14718) is not identical to CVE-2018-12019, CVE-2018-14720, CVE-2018-14721, CVE-2018-14722,CVE-2018-12023 and CVE-2018-11307.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.7 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.5)[2.8.0,2.8.11.3)[2.9.0,2.9.7)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform an XML External Entity (XXE) Injection via the JDK classes due to an incomplete fix for the CVE-2017-7525 deserialization flaw.

    Note: This vulnerability (CVE-2018-14720) is not identical to CVE-2018-12018, CVE-2018-14729, CVE-2018-14721, CVE-2018-14722,CVE-2018-12023 and CVE-2018-11307.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.7 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.5)[2.8.0,2.8.11.3)[2.9.0,2.9.7)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attack, if the user is handling untrusted content or using the Default Typing feature. This vulnerability is due to an incomplete fix for the CVE-2017-7525 deserialization flaw.

    Note: This vulnerability (CVE-2018-12023) is not identical to CVE-2018-12018, CVE-2018-12019, CVE-2018-14720, CVE-2018-14721, CVE-2018-14722 and CVE-2018-11307.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.4, 2.8.11.2, 2.9.6 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.4)[2.8.0,2.8.11.2)[2.9.0,2.9.6)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It may allow content exfiltration (remote access by sending contents over ftp) when untrusted content is deserialized with default typing enabled. This vulnerability is due to an incomplete fix for the CVE-2017-7525 deserialization flaw.

    Note: This vulnerability (CVE-2018-11307) is not identical to CVE-2018-12018,CVE-2018-12019, CVE-2018-14720, CVE-2018-14721, CVE-2018-14722 and CVE-2018-14723.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.4, 2.8.11.2, 2.9.5 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.4)[2.8.0,2.8.11.2)[2.9.0,2.9.5)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attack, if the user is handling untrusted content or using the Default Typing feature. an incomplete fix for the CVE-2017-7525 deserialization flaw.

    Note: This vulnerability (CVE-2018-12022) is not identical to CVE-2018-12018,CVE-2018-12019, CVE-2018-14720, CVE-2018-14721, CVE-2018-14723 and CVE-2018-11307.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.4, 2.8.11.2, 2.9.6 or higher.

    [,2.6.7.3)[2.7.0,2.7.9.4)[2.8.0,2.8.11.2)[2.9.0,2.9.6)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.5, 2.8.11.1, 2.9.5 or higher.

    [,2.6.7.5)[2.7.0,2.8.11.1)[2.9.0,2.9.5)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to an incomplete black list (incomplete fix for CVE-2017-7525 and CVE-2017-17485). This is exploitable via two different gadgets that bypass a blacklist.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.8.11, 2.9.4 or higher.

    [,2.8.11)[2.9.0,2.9.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to an incomplete black list (incomplete fix for CVE-2017-7525). This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.8.11, 2.9.4 or higher.

    [,2.8.11)[2.9.0,2.9.4)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to an incomplete black list (incomplete fix for CVE-2017-7525).

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.1, 2.7.9.1, 2.8.10 or higher.

    [,2.6.7.1)[2.7.0,2.7.9.1)[2.8.0,2.8.10)
    • H
    Deserialization of Untrusted Data

    com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker may exploit this issue by sending a maliciously crafted input to the readValue method of the ObjectMapper.

    How to fix Deserialization of Untrusted Data?

    Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.1, 2.7.9.1, 2.8.9 or higher.

    [,2.6.7.1)[2.7.0,2.7.9.1)[2.8.0,2.8.9)