Vulnerability identifier: #VU9607
Vulnerability risk: High
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
jackson-databind
Universal components / Libraries /
Libraries used by multiple products
Vendor: FasterXML
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists in the jackson-databind development library due to improper implementation of blacklists for input handled by the ObjectMapper object readValue method. A remote unauthenticated attacker can send a malicious input and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
jackson-databind: 2.9.0, 2.8.0 - 2.8.9
CPE
External links
http://github.com/FasterXML/jackson-databind/issues/1737
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?