#VU19941 Information disclosure in jackson-databind - CVE-2019-12086
Published: August 6, 2019
jackson-databind
FasterXML
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a polymorphic typing issue when Default Typing is enabled for an externally exposed JSON endpoint and the service has the mysql-connector-java jar in the classpath. A remote attacker can send a specially crafted JSON message and read arbitrary local files on the server due to the missing "com.mysql.cj.jdbc.admin.MiniAdmin" validation.
Remediation
External links
- http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/
- https://github.com/FasterXML/jackson-databind/issues/2326
- https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9
- https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html
- https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062