A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
No history.
Information
Published : 2018-02-06 15:29
Updated : 2023-11-07 02:39
NVD link : CVE-2017-15095
Mitre link : CVE-2017-15095
CVE.ORG link : CVE-2017-15095
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
- satellite_capsule
- satellite
- enterprise_linux
- openshift_container_platform
netapp
- oncommand_balance
- oncommand_performance_manager
- oncommand_shift
- snapcenter
oracle
- primavera_unifier
- identity_manager
- utilities_advanced_spatial_and_operational_analytics
- webcenter_portal
- clusterware
- financial_services_analytical_applications_infrastructure
- jd_edwards_enterpriseone_tools
- global_lifecycle_management_opatchauto
- communications_billing_and_revenue_management
- banking_platform
- communications_diameter_signaling_router
- database_server
- enterprise_manager_for_virtualization
- communications_instant_messaging_server
debian
- debian_linux
fasterxml
- jackson-databind