#VU9607 Remote code execution in jackson-databind


Published: 2017-12-08 | Updated: 2018-10-08

Vulnerability identifier: #VU9607

Vulnerability risk: High

CVSSv3.1:

CVE-ID: CVE-2017-15095

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
jackson-databind
Universal components / Libraries / Libraries used by multiple products

Vendor: FasterXML

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in the jackson-databind development library due to improper implementation of blacklists for input handled by the ObjectMapper object readValue method. A remote unauthenticated attacker can send a malicious input and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

jackson-databind: 2.9.0, 2.8.0 - 2.8.9


CPE

External links
http://github.com/FasterXML/jackson-databind/issues/1737


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability