A vulnerability was found in FasterXML jackson-databind before versions 2.7.9.4, 2.8.11.2, 2.9.6. A new potential gadget type from MyBatis (https://github.com/mybatis/mybatis-3) has been reported. It may allow content exfiltration (remote access by sending contents over ftp) when untrusted content is deserialized with default typing enabled. Upstream Bug: https://github.com/FasterXML/jackson-databind/issues/2032 References: https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.8
OpenDaylight does not use any packages or classes under the org.apache.ibatis (namespace of the MyBatis SQL mapper) and as such is not affected by this. We already have active bugs open to update jackson-databind regardless.
Relevant upstream patch: https://github.com/FasterXML/jackson-databind/commit/27b4defc270454dea6842bd9279f17387eceb737
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:0782 https://access.redhat.com/errata/RHSA-2019:0782
This issue has been addressed in the following products: Red Hat Openshift Application Runtimes Via RHSA-2019:0877 https://access.redhat.com/errata/RHSA-2019:0877
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2019:1106 https://access.redhat.com/errata/RHSA-2019:1106
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6 Via RHSA-2019:1107 https://access.redhat.com/errata/RHSA-2019:1107
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7 Via RHSA-2019:1108 https://access.redhat.com/errata/RHSA-2019:1108
This issue has been addressed in the following products: Red Hat Single Sign-On 7.3.1 zip Via RHSA-2019:1140 https://access.redhat.com/errata/RHSA-2019:1140
This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2019:1823 https://access.redhat.com/errata/RHSA-2019:1823
This issue has been addressed in the following products: Red Hat Decision Manager Via RHSA-2019:1822 https://access.redhat.com/errata/RHSA-2019:1822
Statement: Red Hat Satellite 6 is not affected by this issue, since Candlepin's java runtime environment does not load MyBatis classes. Red Hat Virtualization 4 is not affected by this issue, since it does not include MyBatis classes. Red Hat Fuse 6 and 7 are not directly affected by this issue, as although they do ship the vulnerable jackson-databind component, they do not enable polymorphic deserialization or default typing which are required for exploitability. Their impacts have correspondingly been reduced to Moderate. Future updates may address this flaw.
This issue has been addressed in the following products: Red Hat Fuse 6.3 Via RHSA-2019:2804 https://access.redhat.com/errata/RHSA-2019:2804
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.1 Via RHSA-2019:2858 https://access.redhat.com/errata/RHSA-2019:2858
This issue has been addressed in the following products: Red Hat Fuse Intergration Services 2.0 based on Fuse 6.3 R13 Via RHSA-2019:3002 https://access.redhat.com/errata/RHSA-2019:3002
This issue has been addressed in the following products: Red Hat JBoss Data Virtualization 6.4.8 Via RHSA-2019:3140 https://access.redhat.com/errata/RHSA-2019:3140
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2019:3149 https://access.redhat.com/errata/RHSA-2019:3149
This issue has been addressed in the following products: Red Hat Fuse 7.5.0 Via RHSA-2019:3892 https://access.redhat.com/errata/RHSA-2019:3892
This issue has been addressed in the following products: Red Hat Data Grid Via RHSA-2019:4037 https://access.redhat.com/errata/RHSA-2019:4037