-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Another two gadgets to exploit default typing issue in jackson-databind (CVE-2018-5968) #1899
Comments
I am not sure I saw that email. Which address was it from (or what was the title)? |
The title is |
Ok somehow I do not see this via that email address (with that title or any other combination). |
@OneSourceCat Should the latest published version of |
@codelion before assuming anything, make sure to also read: to know under what special conditions vulnerabilities exist. For most Jackson users these are not applicable. |
@cowtowncoder I've already resent the report. My email address is chongrui123[at]gmail.com. |
@OneSourceCat Ah. Gmail decided to put them in SPAM for some weird reason. :-o |
will this fix be added to the 2.8 branch |
Yes, it is in |
thanks! |
OWASP dependency check is still reporting this as vulnerable after updating to 2.8.11.1 |
@arunnc that’s a problem with OWASP dependency check, you can report it to them. |
Hi Asankhaya
Issue is NVD database is not updated with the micro patch 2.8.11.1 version
and fix details.
Would you know how to get this corrected?
On 14-Feb-2018 9:46 PM, "Asankhaya Sharma" <[email protected]> wrote:
@arunnc <https://github.com/arunnc> that’s a problem with OWASP dependency
check, you can report it to them.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#1899 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AVtJFfwjs3rlS40kjlDXsT4BmUc7OCveks5tUwbOgaJpZM4Rixed>
.
|
@arunnc In general, we cannot rely on NVD for the accuracy of vulnerable and fix versions. Shameless plug but you can try using https://www.sourceclear.com/ instead. |
@codelion At https://www.sourceclear.com/vulnerability-database/security/remote-code-execution-rce-/java/sid-5732/summary CVE-2018-5968 is referenced as fixed in 2.7.9.3. However, I find it difficult to read that from the commit/code comments related to 2.7.9.3. Could you elaborate on how you've come to the conclusion that 2.7.9.3 is safe (and includes a fix for CVE-2018-5968) ? |
GHSA-w3f4-3q6j-rh82 seems to indicate the version 2.6.7.3 is affected, is it that the advisories data is out of date. What are the steps to update it? |
@ScrapCodes I don't know how github advisories work, what data source they use. If anyone is interested, can point maintainers to https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.6.7.x which points that |
Another 2 gadget types reported against Hibernate, iBatis.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2018-5968
Fixed in:
The text was updated successfully, but these errors were encountered: