CVE-2018-12022
Published: 21 March 2019
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
From the Ubuntu Security Team
It was discovered that Jackson Databind incorrectly handled deserialization. An attacker could possibly use this issue to execute arbitrary code or other unspecified impact.
Priority
Status
Package | Release | Status |
---|---|---|
jackson-databind Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(2.9.8-1~18.04)
|
cosmic |
Not vulnerable
(2.9.8-1~18.04)
|
|
disco |
Not vulnerable
(2.9.8-1)
|
|
groovy |
Not vulnerable
(2.9.8-1)
|
|
upstream |
Released
(2.9.8-1)
|
|
focal |
Not vulnerable
(2.9.8-1)
|
|
xenial |
Released
(2.4.2-3ubuntu0.1~esm2)
Available with Ubuntu Pro |
|
hirsute |
Not vulnerable
(2.9.8-1)
|
|
impish |
Not vulnerable
(2.9.8-1)
|
|
jammy |
Not vulnerable
(2.9.8-1)
|
|
kinetic |
Not vulnerable
(2.9.8-1)
|
|
lunar |
Not vulnerable
(2.9.8-1)
|
|
trusty |
Needed
|
|
mantic |
Not vulnerable
(2.9.8-1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |