CVE-2018-5968

FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.
References
Link Resource
https://access.redhat.com/errata/RHSA-2018:0478 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0479 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0480 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0481 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1525 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2858 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3149 Third Party Advisory
https://github.com/FasterXML/jackson-databind/issues/1899 Third Party Advisory
https://security.netapp.com/advisory/ntap-20180423-0002/ Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us Third Party Advisory
https://www.debian.org/security/2018/dsa-4114 Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0478 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0479 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0480 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0481 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1525 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2858 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3149 Third Party Advisory
https://github.com/FasterXML/jackson-databind/issues/1899 Third Party Advisory
https://security.netapp.com/advisory/ntap-20180423-0002/ Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us Third Party Advisory
https://www.debian.org/security/2018/dsa-4114 Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:09

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:0478 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0478 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0479 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0479 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0480 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0480 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0481 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0481 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1525 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1525 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2858 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2858 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:3149 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:3149 - Third Party Advisory
References () https://github.com/FasterXML/jackson-databind/issues/1899 - Third Party Advisory () https://github.com/FasterXML/jackson-databind/issues/1899 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20180423-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180423-0002/ - Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4114 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4114 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuoct2020.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpuoct2020.html - Third Party Advisory

Information

Published : 2018-01-22 04:29

Updated : 2024-11-21 04:09


NVD link : CVE-2018-5968

Mitre link : CVE-2018-5968

CVE.ORG link : CVE-2018-5968


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • virtualization
  • jboss_enterprise_application_platform
  • openshift_container_platform
  • virtualization_host

netapp

  • e-series_santricity_web_services_proxy
  • oncommand_shift
  • e-series_santricity_os_controller

fasterxml

  • jackson-databind

debian

  • debian_linux
CWE
CWE-184

Incomplete List of Disallowed Inputs

CWE-502

Deserialization of Untrusted Data