A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
No history.
Information
Published : 2018-02-06 15:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15095
Mitre link : CVE-2017-15095
CVE.ORG link : CVE-2017-15095
JSON object : View
Products Affected
oracle
- primavera_unifier
- global_lifecycle_management_opatchauto
- utilities_advanced_spatial_and_operational_analytics
- communications_billing_and_revenue_management
- clusterware
- database_server
- communications_instant_messaging_server
- jd_edwards_enterpriseone_tools
- banking_platform
- financial_services_analytical_applications_infrastructure
- webcenter_portal
- identity_manager
- communications_diameter_signaling_router
- enterprise_manager_for_virtualization
redhat
- enterprise_linux
- jboss_enterprise_application_platform
- openshift_container_platform
- satellite
- satellite_capsule
netapp
- oncommand_balance
- snapcenter
- oncommand_shift
- oncommand_performance_manager
debian
- debian_linux
fasterxml
- jackson-databind