com.fasterxml.jackson.core:jackson-databind@2.9.7 vulnerabilities

  • latest version

    2.18.0

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the com.fasterxml.jackson.core:jackson-databind package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Denial of Service (DoS)

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the _deserializeFromArray() function in BeanDeserializer, due to resource exhaustion when processing a deeply nested array.

NOTE: For this vulnerability to be exploitable the non-default DeserializationFeature must be enabled.

How to fix Denial of Service (DoS)?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.7.1, 2.13.4 or higher.

[2.4.0,2.12.7.1) [2.13.0,2.13.4)
  • M
Denial of Service (DoS)

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Denial of Service (DoS) in the _deserializeWrappedValue() function in StdDeserializer.java, due to resource exhaustion when processing deeply nested arrays.

NOTE: This vulnerability is only exploitable when the non-default UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.

How to fix Denial of Service (DoS)?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.7.1, 2.13.4.1 or higher.

[2.4.0,2.12.7.1) [2.13.0,2.13.4.1)
  • H
Denial of Service (DoS)

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Denial of Service (DoS) via a large depth of nested objects.

How to fix Denial of Service (DoS)?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.12.6.1, 2.13.2.1 or higher.

[,2.12.6.1) [2.13.0,2.13.2.1)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A malicious user could perform a SSRF attack via the javax.swing gadget (specifically javax.swing.JTextPane).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.7 or higher.

[,2.9.10.7)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[2.0.0,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.8 or higher.

[,2.9.10.8)
  • H
XML External Entity (XXE) Injection

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. A flaw was found in FasterXML Jackson Databind, where it does not have entity expansion secured properly in the DOMDeserializer class. The highest threat from this vulnerability is data integrity.

How to fix XML External Entity (XXE) Injection?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.7, 2.10.5.1 or higher.

[2.6.0,2.6.7.4) [2.9.0,2.9.10.7) [2.10.0,2.10.5.1)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to the class ignite-jta.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.6 or higher.

[,2.6.7.4) [2.7.0,2.9.10.6)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.6 or higher.

[,2.6.7.4) [2.7.0,2.9.10.6)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to conduct a Deserialization attack using the oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (apache/drill) class gadget if polymorphic type handling is enabled and an application using this package allows user input which gets deserialized.

Note: This vulnerability does not affect release 2.10.0 onward.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

[,2.6.7.4) [2.7.0,2.9.10.5)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to conduct a Deserialization attack using any of the following class gadget available within weblogic/oracle-aqjms if polymorphic type handling is enabled and an application using this package allows user input which gets deserialized.

  • oracle.jms.AQjmsQueueConnectionFactory
  • oracle.jms.AQjmsXATopicConnectionFactory
  • oracle.jms.AQjmsTopicConnectionFactory
  • oracle.jms.AQjmsXAQueueConnectionFactory
  • oracle.jms.AQjmsXAConnectionFactory

Note: This vulnerability does not affect release 2.10.0 onward.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

[,2.6.7.4) [2.7.0,2.9.10.5)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

[,2.6.7.4) [2.7.0,2.9.10.5)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It is possible to conduct a Deserialization attack using the com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (xalan2) class gadget if polymorphic type handling is enabled and an application using this package allows user input which gets deserialized.

Note: This vulnerability does not affect release 2.10.0 onward.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.5 or higher.

[,2.6.7.4) [2.7.0,2.9.10.5)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to gadget org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to gadgets org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to gadget org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to gadget javax.swing.JEditorPane.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.7.9.7, 2.8.11.6, 2.9.10.4 or higher.

[2.0.0,2.6.7.4) [2.7.0,2.7.9.7) [2.8.0,2.8.11.6) [2.9.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to gadget org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[2.0.0,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).

Note: This vulnerability does not affect release 2.10.0 onward.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[2.0.0,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. The package mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).

Note: This vulnerability does not affect release 2.10.0 onward.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.9.10.4 or higher.

[2.0.0,2.6.7.4) [2.7.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to an incomplete black list (incomplete fix for CVE-2017-7525). It doesn't block common-configuration JNDI classes org.apache.commons.configuration.JNDIConfiguration and org.apache.commons.configuration2.JNDIConfiguration.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.8.11.5, 2.9.10.3 or higher.

[,2.6.7.3) [2.8.0,2.8.11.5) [2.9.0,2.9.10.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Mishandles the interaction between serialization gadgets and typing, related to:

  • com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap)
  • br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core)
  • org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config)

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.7.9.7, 2.8.11.6, 2.9.10.4 or higher.

[,2.6.7.4) [2.7.0,2.7.9.7) [2.8.0,2.8.11.6) [2.9.0,2.9.10.4)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to an incomplete black list (incomplete fix for CVE-2017-7525). It lacks xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 or higher.

[,2.6.7.4) [2.7.0,2.7.9.7) [2.8.0,2.8.11.5) [2.9.0,2.9.10.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. Two additional net.sf.ehcache gadgets are not blacklisted.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.2 or higher.

[,2.9.10.2)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. When Default Typing is enabled for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.1 or higher.

[2.0.0,2.9.10.1)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10 or higher.

[,2.9.10)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered as com.p6spy.engine.spy.P6DataSource was not blocked. An attacker could leverage this gadget type to perform Remote Code Execution attacks through deserialization.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.1, 2.8.11.5, 2.6.7.3 or higher.

[2.9.0,2.9.10.1) [2.7.0,2.8.11.5) [,2.6.7.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered within org.apache.commons.dbcp.datasources.SharedPoolDataSource was not blocked. An attacker could leverage this gadget type to perform Remote Code Execution attacks through deserialization.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10.1, 2.8.11.5, 2.6.7.3 or higher.

[2.9.0,2.9.10.1) [2.7.0,2.8.11.5) [,2.6.7.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered as com.zaxxer.hikari.HikariDataSource was not blocked. Note: This is a different vulnerability than CVE-2019-14540.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10, 2.8.11.5, 2.6.7.3 or higher.

[2.9.0,2.9.10) [2.7.0,2.8.11.5) [,2.6.7.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered as com.zaxxer.hikari.HikariConfig was not blocked. Note: This is a different vulnerability than CVE-2019-16335.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10, 2.8.11.5, 2.6.7.3 or higher.

[2.9.0,2.9.10) [2.7.0,2.8.11.5) [,2.6.7.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It mishandles the interaction between serialization gadgets and typing, related to org.apache.cxf.jaxrs.provider.XSLTJaxbProvider.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.10, 2.8.11.5, 2.6.7.3 or higher.

[2.9.0,2.9.10) [2.7.0,2.8.11.5) [,2.6.7.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. SubTypeValidator.java mishandles default typing when ehcache is used, leading to remote code execution.

NOTE: This vulnerability has also been identified as: CVE-2019-14439

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.2, 2.8.11.4, 2.7.9.6 or higher.

[2.9.0,2.9.9.2) [2.8.0,2.8.11.4) [,2.7.9.6)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. SubTypeValidator.java mishandles default typing when ehcache is used, leading to remote code execution.

NOTE: This vulnerability has also been identified as: CVE-2019-14379

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.2, 2.8.11.4, 2.7.9.6 or higher.

[2.9.0,2.9.9.2) [2.8.0,2.8.11.4) [,2.7.9.6)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data which allows attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.1, 2.8.11.4, 2.7.9.6 or higher.

[2.9.0,2.9.9.1) [2.8.0,2.8.11.4) [,2.7.9.6)
  • M
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9.1, 2.8.11.4, 2.7.9.6 or higher.

[2.9.0,2.9.9.1) [2.8.0,2.8.11.4) [,2.7.9.6)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. When Default Typing is enabled for an externally exposed JSON endpoint, the service has the mysql-connector-java jar in the classpath. An attacker can host a crafted MySQL server reachable by the victim and send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs due to missing com.mysql.cj.jdbc.admin.MiniAdmin validation.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 or higher.

[2.9.0,2.9.9) [2.8.0,2.8.11.4) [2.7.0,2.7.9.6) [,2.6.7.3)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attacks due to not blocking the axis2-transport-jms class from polymorphic deserialization.

Note This vulnerability (CVE-2018-19360) is not identical to CVE-2018-19362 and CVE-2018-19361.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.8 or higher.

[,2.6.7.3) [2.7.0,2.7.9.5) [2.8.0,2.8.11.3) [2.9.0,2.9.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attacks due to not blocking the jboss-common-core class from polymorphic deserialization.

Note This vulnerability (CVE-2018-19362) is not identical to CVE-2018-19360 and CVE-2018-19361.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.8 or higher.

[,2.6.7.3) [2.7.0,2.7.9.5) [2.8.0,2.8.11.3) [2.9.0,2.9.8)
  • H
Deserialization of Untrusted Data

com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. An attacker could perform a Remote Code Execution attacks due to not blocking the axis2-transport-jms class from polymorphic deserialization.

Note This vulnerability (CVE-2018-19361) is not identical to CVE-2018-19362 and CVE-2018-19360.

How to fix Deserialization of Untrusted Data?

Upgrade com.fasterxml.jackson.core:jackson-databind to version 2.6.7.3, 2.7.9.5, 2.8.11.3, 2.9.8 or higher.

[,2.6.7.3) [2.7.0,2.7.9.5) [2.8.0,2.8.11.3) [2.9.0,2.9.8)