CVE-2018-7489
high-risk
Published 2018-02-26
FasterXML jackson-databind before 2.7.9.3, 2.8.x before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
Do I need to act?
!
36.2% chance of exploitation in next 30 days
EPSS score — higher than 64% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 5cacb069a16653844e4c04c2a53578666080c1bb, efb1370f160feced7a51dca3bf85f9e1949256f0, 5c95315ffbaf6f64bd3a2970a001ecce51c10032
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (8)
References (56)
Third Party Advisory
http://www.securityfocus.com/bid/103203
Third Party Advisory
http://www.securitytracker.com/id/1040693
Third Party Advisory
http://www.securitytracker.com/id/1041890
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1447
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1448
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1449
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1450
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1451
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1786
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2088
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2089
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2090
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2938
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2939
Third Party Advisory
https://github.com/FasterXML/jackson-databind/issues/1931
and 36 more references
62
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
16/34 · Moderate
Exposure
14/34 · Moderate