CVE-2018-14720
Published: 2 January 2019
FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.
From the Ubuntu Security Team
It was discovered that Jackson Databind incorrectly handled deserialization. An attacker could possibly use this issue to execute XML entity (XXE) attacks.
Priority
Status
Package | Release | Status |
---|---|---|
jackson-databind Launchpad, Ubuntu, Debian |
hirsute |
Not vulnerable
(2.9.7)
|
xenial |
Released
(2.4.2-3ubuntu0.1~esm2)
Available with Ubuntu Pro |
|
kinetic |
Not vulnerable
(2.9.7)
|
|
trusty |
Needed
|
|
lunar |
Not vulnerable
(2.9.7)
|
|
bionic |
Not vulnerable
(2.9.8-1)
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(2.9.7)
|
|
eoan |
Not vulnerable
(2.9.7)
|
|
focal |
Not vulnerable
(2.9.7)
|
|
groovy |
Not vulnerable
(2.9.7)
|
|
impish |
Not vulnerable
(2.9.7)
|
|
jammy |
Not vulnerable
(2.9.7)
|
|
upstream |
Released
(2.9.7)
|
|
mantic |
Not vulnerable
(2.9.7)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14720
- https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44
- https://github.com/FasterXML/jackson-databind/issues/2097
- https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7
- https://ubuntu.com/security/notices/USN-4813-1
- NVD
- Launchpad
- Debian