Vulnerability Description
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fasterxml | Jackson-Databind | < 2.6.7.3 |
| Debian | Debian Linux | 8.0 |
| Redhat | Jboss Enterprise Application Platform | 6.0.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Openshift Container Platform | 4.1 |
| Netapp | E-Series Santricity Os Controller | >= 11.0.0, <= 11.60.3 |
| Netapp | E-Series Santricity Web Services Proxy | - |
| Netapp | Oncommand Shift | - |
| Netapp | Snapcenter | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/541652/100/0/threadedThird Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:0116Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0342Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0478Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0479Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0480Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0481Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1447Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1448Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1449Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1450Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1451Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2930Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1782Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1797Third Party Advisory
FAQ
What is CVE-2017-17485?
CVE-2017-17485 is a vulnerability with a CVSS score of 9.8 (CRITICAL). FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploita...
How severe is CVE-2017-17485?
CVE-2017-17485 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-17485?
Check the references section above for vendor advisories and patch information. Affected products include: Fasterxml Jackson-Databind, Debian Debian Linux, Redhat Jboss Enterprise Application Platform, Redhat Enterprise Linux Server, Redhat Openshift Container Platform.