SB20251022103 - Information Exposure Through an Error Message in Enterprise Manager Base Platform 



SB20251022103 - Information Exposure Through an Error Message in Enterprise Manager Base Platform

Published: October 22, 2025

Security Bulletin ID SB20251022103
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Information Exposure Through an Error Message (CVE-ID: CVE-2025-49128)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. A local user can gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.