CVE Vulnerabilities

CVE-2018-19361

Deserialization of Untrusted Data

Published: Jan 02, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.3 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.

Weakness

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

Affected Software

NameVendorStart VersionEnd Version
Jackson-databindFasterxml2.6.0 (including)2.6.7.2 (including)
Jackson-databindFasterxml2.7.0 (including)2.7.9.5 (excluding)
Jackson-databindFasterxml2.8.0 (including)2.8.11.3 (excluding)
Jackson-databindFasterxml2.9.0 (including)2.9.8 (excluding)
OpenShift Logging 5.0RedHatopenshift-logging/elasticsearch6-rhel8:v5.0.3-1*
Red Hat Data GridRedHatjackson-databind*
Red Hat Fuse 6.3RedHatjackson-databind*
Red Hat Fuse 7.5.0RedHatjackson-databind*
Red Hat Fuse Intergration Services 2.0 based on Fuse 6.3 R13RedHatjackson-databind*
Red Hat JBoss BPMS 6.4RedHatjackson-databind*
Red Hat JBoss BPMS 7.4RedHatjackson-databind*
Red Hat JBoss BRMS 6.4.12RedHatjackson-databind*
Red Hat JBoss BRMS 7.4RedHatjackson-databind*
Red Hat JBoss Data Virtualization 6.4.8RedHatjackson-databind*
Red Hat JBoss Enterprise Application Platform Continuous DeliveryRedHatjackson-databind*
Red Hat OpenShift Container Platform 3.11RedHatopenshift3/ose-logging-elasticsearch5:v3.11.153-2*
Red Hat OpenShift Container Platform 4.1RedHatopenshift4/ose-logging-elasticsearch5:v4.1.18-201909201915*
Red Hat OpenShift Container Platform 4.6RedHatopenshift4/ose-logging-elasticsearch6:v4.6.0-202104161407.p0*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-maven35-jackson-databind-0:2.7.6-2.5.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-maven35-jackson-databind-0:2.7.6-2.5.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSRedHatrh-maven35-jackson-databind-0:2.7.6-2.5.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-maven35-jackson-databind-0:2.7.6-2.5.el7*
Text-Only RHOARRedHat*
Jackson-databindUbuntucosmic*
Jackson-databindUbuntudevel*
Jackson-databindUbuntudisco*
Jackson-databindUbuntueoan*
Jackson-databindUbuntuesm-apps/focal*
Jackson-databindUbuntuesm-apps/jammy*
Jackson-databindUbuntuesm-apps/noble*
Jackson-databindUbuntuesm-apps/xenial*
Jackson-databindUbuntuesm-infra-legacy/trusty*
Jackson-databindUbuntufocal*
Jackson-databindUbuntugroovy*
Jackson-databindUbuntuhirsute*
Jackson-databindUbuntuimpish*
Jackson-databindUbuntujammy*
Jackson-databindUbuntukinetic*
Jackson-databindUbuntulunar*
Jackson-databindUbuntumantic*
Jackson-databindUbuntunoble*
Jackson-databindUbuntuoracular*
Jackson-databindUbuntuplucky*
Jackson-databindUbuntuquesting*
Jackson-databindUbuntutrusty*
Jackson-databindUbuntutrusty/esm*
Jackson-databindUbuntuupstream*
Jackson-databindUbuntuxenial*

Potential Mitigations

  • Make fields transient to protect them from deserialization.
  • An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.

References