CVE-2018-14721
high-risk
Published 2019-01-02
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
Do I need to act?
~
9.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: fab5c3877f7b8ae28a8e3a14d805bc9dcc8c153d, 2723191696b098f9b7566a5094a932baf5f7563e, 71c8143d4b1e2696b27d10cc969b22248e1ab6b6, b36c8ac5d8cfce192059fc7c278766e685bf8a6c, 87d29af25e82a249ea15858e2d4ecbf64091db44
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
References (58)
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0959
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0782
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1106
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1107
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1140
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1822
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1823
Issue Tracking
https://github.com/FasterXML/jackson-databind/issues/2097
and 38 more references
68
/ 100
high-risk
Severity
33/34 · Critical
Exploitability
11/34 · Low
Exposure
24/34 · High