Vulnerability Description
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fasterxml | Jackson-Databind | >= 2.0.0, < 2.6.7.3 |
| Debian | Debian Linux | 9.0 |
| Fedoraproject | Fedora | 29 |
| Oracle | Jd Edwards Enterpriseone Tools | 9.2 |
| Oracle | Retail Merchandising System | 15.0 |
| Redhat | Automation Manager | 7.3.1 |
| Redhat | Decision Manager | 7.3.1 |
| Redhat | Jboss Brms | 6.4.10 |
| Redhat | Jboss Enterprise Application Platform | 7.2.0 |
| Redhat | Openshift Container Platform | 3.11 |
| Redhat | Single Sign-On | 7.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/107585Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0959Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0782Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0877Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1106Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1107Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1108Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1140Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1782Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1797Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1822Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1823Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2804Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2858Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3002Third Party Advisory
FAQ
What is CVE-2018-12022?
CVE-2018-12022 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db ja...
How severe is CVE-2018-12022?
CVE-2018-12022 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12022?
Check the references section above for vendor advisories and patch information. Affected products include: Fasterxml Jackson-Databind, Debian Debian Linux, Fedoraproject Fedora, Oracle Jd Edwards Enterpriseone Tools, Oracle Retail Merchandising System.