jackson-databind vulnerable to remote code execution due to incorrect deserialization and blocklist bypass
Critical severity
GitHub Reviewed
Published
Oct 18, 2018
to the GitHub Advisory Database
•
Updated Mar 1, 2024
Package
Affected versions
>= 2.9.0, < 2.9.4
>= 2.8.0, < 2.8.11
< 2.7.9.2
Patched versions
2.9.4
2.8.11
2.7.9.2
Description
Published by the National Vulnerability Database
Jan 10, 2018
Published to the GitHub Advisory Database
Oct 18, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 1, 2024
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
References