CVE-2018-5968 High Severity Vulnerability detected by WhiteSource
mend-bolt-for-github opened this issue · 0 comments
CVE-2018-5968 - High Severity Vulnerability
Vulnerable Library - jackson-databind-2.7.4.jar
General data-binding functionality for Jackson: works on core streaming API
path: radle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.7.4/1e9c6f3659644aeac84872c3b62d8e363bf4c96d/jackson-databind-2.7.4.jar
Library home page: http://github.com/FasterXML/jackson
Dependency Hierarchy:
- ❌ jackson-databind-2.7.4.jar (Vulnerable Library)
Vulnerability Details
FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.
Publish Date: 2018-01-22
URL: CVE-2018-5968
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Change files
Origin: FasterXML/jackson-databind@038b471
Release Date: 2018-01-22
Fix Resolution: Replace or update the following files: SubTypeValidator.java, VERSION
Step up your Open Source Security Game with WhiteSource here