Bug 1848960 (CVE-2020-14060) - CVE-2020-14060 jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
Summary: CVE-2020-14060 jackson-databind: serialization in oadd.org.apache.xalan.lib.s...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-14060
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1848968 1849551 1849552 1850637 1850638
Blocks: 1848970
TreeView+ depends on / blocked
 
Reported: 2020-06-19 11:57 UTC by Dhananjay Arunesh
Modified: 2021-12-14 18:47 UTC (History)
110 users (show)

Fixed In Version: jackson-databind 2.9.10.5
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Environment:
Last Closed: 2020-07-28 19:28:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:3192 0 None None None 2020-07-28 15:57:22 UTC
Red Hat Product Errata RHSA-2020:3196 0 None None None 2020-07-29 06:09:05 UTC
Red Hat Product Errata RHSA-2020:3197 0 None None None 2020-07-29 06:25:24 UTC

Description Dhananjay Arunesh 2020-06-19 11:57:29 UTC
A Vulnerability was found in FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool

References:
https://github.com/FasterXML/jackson-databind/issues/2688
https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062

Comment 1 Dhananjay Arunesh 2020-06-19 12:08:39 UTC
Created jackson-databind tracking bugs for this issue:

Affects: fedora-all [bug 1848968]

Comment 3 Chess Hazlett 2020-06-19 16:59:52 UTC
Mitigation:

The following conditions are needed for an exploit, we recommend avoiding all if possible:
* Deserialization from sources you do not control
* enableDefaultTyping()
* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS
* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath

Comment 16 Yadnyawalk Tale 2020-06-25 11:17:56 UTC
Statement:

While OpenShift Container Platform's elasticsearch plugins do ship the vulnerable component, it doesn't do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.

Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.

The PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.

The version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.

Comment 17 errata-xmlrpc 2020-07-28 15:57:15 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.7.0

Via RHSA-2020:3192 https://access.redhat.com/errata/RHSA-2020:3192

Comment 18 Product Security DevOps Team 2020-07-28 19:28:13 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-14060

Comment 19 errata-xmlrpc 2020-07-29 06:09:00 UTC
This issue has been addressed in the following products:

  Red Hat Decision Manager

Via RHSA-2020:3196 https://access.redhat.com/errata/RHSA-2020:3196

Comment 20 errata-xmlrpc 2020-07-29 06:25:19 UTC
This issue has been addressed in the following products:

  Red Hat Process Automation

Via RHSA-2020:3197 https://access.redhat.com/errata/RHSA-2020:3197


Note You need to log in before you can comment on or make changes to this bug.