CVE-2018-14721 - Server-Side Request Forgery (SSRF)

Severity

75%

Complexity

99%

Confidentiality

106%

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

CVSS 3.0 Base Score 9.9. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

Overview

First reported 6 years ago

2019-01-02 18:29:00

Last updated 5 years ago

2019-09-27 03:15:00

Affected Software

FasterXML Jackson-databind 2.7.0 Release Candidate 1

2.7.0

FasterXML Jackson-databind 2.7.0 Release Candidate 2

2.7.0

FasterXML Jackson-databind 2.7.0 Release Candidate 3

2.7.0

Debian Linux 8.0 (Jessie)

8.0

Debian Linux 9.0

9.0

Oracle Primavera Unifier 16.1

16.1

Oracle Primavera Unifier 16.2

16.2

Oracle Primavera Unifier 18.8

18.8

Oracle Retail Merchandising System 15.0

15.0

Oracle Retail Merchandising System 16.0

16.0

Oracle WebCenter Portal 12.2.1.3.0

12.2.1.3.0

Red Hat JBoss Enterprise Application Platform 7.2.0

7.2.0

Red Hat OpenShift Container Platform 3.11

3.11

References

RHBA-2019:0959

Third Party Advisory

RHSA-2019:0782

Third Party Advisory

RHSA-2019:1106

Third Party Advisory

RHSA-2019:1107

Third Party Advisory

RHSA-2019:1108

Third Party Advisory

RHSA-2019:1140

Third Party Advisory

RHSA-2019:1822

Third Party Advisory

RHSA-2019:1823

Third Party Advisory

RHSA-2019:2858

RHSA-2019:3149

RHSA-2019:3892

RHSA-2019:4037

https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7

Patch, Release Notes, Third Party Advisory

https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44

Patch, Third Party Advisory

https://github.com/FasterXML/jackson-databind/issues/2097

Issue Tracking, Patch, Third Party Advisory

[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities

[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities

[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities

[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1

Third Party Advisory

[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update

Mailing List, Third Party Advisory

20190527 [SECURITY] [DSA 4452-1] jackson-databind security update

Mailing List, Third Party Advisory

https://security.netapp.com/advisory/ntap-20190530-0003/

Third Party Advisory

DSA-4452

Third Party Advisory

N/A

https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Patch, Third Party Advisory

https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Patch, Third Party Advisory

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Patch, Third Party Advisory

https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.