CVE-2018-12023
Published: 21 March 2019
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
From the Ubuntu Security Team
It was discovered that Jackson Databind incorrectly handled deserialization. An attacker could possibly use this issue to execute arbitrary code or other unspecified impact.
Priority
Status
Package | Release | Status |
---|---|---|
jackson-databind Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(2.9.8-1)
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(2.9.8-1)
|
|
eoan |
Not vulnerable
(2.9.8-1)
|
|
focal |
Not vulnerable
(2.9.8-1)
|
|
groovy |
Not vulnerable
(2.9.8-1)
|
|
hirsute |
Not vulnerable
(2.9.8-1)
|
|
impish |
Not vulnerable
(2.9.8-1)
|
|
jammy |
Not vulnerable
(2.9.8-1)
|
|
kinetic |
Not vulnerable
(2.9.8-1)
|
|
lunar |
Not vulnerable
(2.9.8-1)
|
|
mantic |
Not vulnerable
(2.9.8-1)
|
|
noble |
Not vulnerable
(2.9.8-1)
|
|
trusty |
Needed
|
|
upstream |
Released
(2.9.8-1)
|
|
xenial |
Released
(2.4.2-3ubuntu0.1~esm2)
Available with Ubuntu Pro |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |