Bug 1666423 (CVE-2018-14720) - CVE-2018-14720 jackson-databind: exfiltration/XXE in some JDK classes
Summary: CVE-2018-14720 jackson-databind: exfiltration/XXE in some JDK classes
Status: CLOSED ERRATA
Alias: CVE-2018-14720
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20180727,repor...
Keywords: Security
Depends On: 1666424 1672879 1672880 1672881 1677138 1677139 1677140 1677141 1677142
Blocks: 1666431
TreeView+ depends on / blocked
 
Reported: 2019-01-15 18:54 UTC by Laura Pardo
Modified: 2019-06-10 10:45 UTC (History)
59 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2019-06-10 10:45:25 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:0782 None None None 2019-04-17 21:01 UTC
Red Hat Product Errata RHSA-2019:1106 None None None 2019-05-08 12:04 UTC
Red Hat Product Errata RHSA-2019:1107 None None None 2019-05-08 12:09 UTC
Red Hat Product Errata RHSA-2019:1108 None None None 2019-05-08 12:11 UTC
Red Hat Product Errata RHSA-2019:1140 None None None 2019-05-09 18:14 UTC

Description Laura Pardo 2019-01-15 18:54:51 UTC
FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block some JDK classes from polymorphic deserialization.


References:
https://github.com/FasterXML/jackson-databind/issues/2097
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7

Upstream Patch:
https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44

Comment 1 Laura Pardo 2019-01-15 18:55:25 UTC
Created jackson-databind tracking bugs for this issue:

Affects: fedora-all [bug 1666424]

Comment 9 Doran Moppert 2019-02-08 05:34:11 UTC
Statement:

Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn't bundle the com.sun.deploy.security.ruleset.DRSHelper class.

Red Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn't bundle the com.sun.deploy.security.ruleset.DRSHelper class.

Comment 10 James Hebden 2019-02-14 05:23:19 UTC
OpenDaylight is installed with the OpenJDK JRE, and as such, the JRE does not include the vulnerable class. In addition, the vulnerable class is not used by OpenDaylight, even though jackson-databind is included by the OpenDaylight-parent aggregator at vulnerable versions. I will still create Moderate priority trackers to get the library updated.

Comment 12 errata-xmlrpc 2019-04-17 21:01:00 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2019:0782 https://access.redhat.com/errata/RHSA-2019:0782

Comment 14 errata-xmlrpc 2019-05-08 12:04:12 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2019:1106 https://access.redhat.com/errata/RHSA-2019:1106

Comment 15 errata-xmlrpc 2019-05-08 12:09:21 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6

Via RHSA-2019:1107 https://access.redhat.com/errata/RHSA-2019:1107

Comment 16 errata-xmlrpc 2019-05-08 12:11:39 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7

Via RHSA-2019:1108 https://access.redhat.com/errata/RHSA-2019:1108

Comment 21 errata-xmlrpc 2019-05-09 18:14:57 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.3.1 zip

Via RHSA-2019:1140 https://access.redhat.com/errata/RHSA-2019:1140


Note You need to log in before you can comment on or make changes to this bug.