CVE-2018-11307
high-risk
Published 2019-07-09
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
Do I need to act?
!
12.6% chance of exploitation in next 30 days
EPSS score — higher than 87% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: ec1adf8c72625fd51b30105afad7464c4332d542, cc654cacb5adcab1e7ddcfb2c2c733d1c61b4147, 0dbab948c8e995f786ad31adc0d6f669ddb27642, 18eb3683f5527ced27fc0a467f687054d1f98d39
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (8)
References (42)
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0782
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1822
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1823
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2804
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2858
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3002
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3140
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3149
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3892
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:4037
Third Party Advisory
https://github.com/FasterXML/jackson-databind/issues/2032
Third Party Advisory
https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-n...
Third Party Advisory
https://nvd.nist.gov/vuln/detail/CVE-2017-7525
Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html
Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2020.html
Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
and 22 more references
58
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
12/34 · Low
Exposure
14/34 · Moderate