漏洞信息详情
FasterXML jackson-databind 代码问题漏洞
漏洞简介
FasterXML jackson-databind是一个基于JAVA可以将XML和JSON等数据格式与JAVA对象进行转换的库。Jackson可以轻松的将Java对象转换成json对象和xml文档,同样也可以将json、xml转换成Java对象。
FasterXML jackson-databind 2.x版本至2.9.9版本中存在代码问题漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/FasterXML/jackson-databind/issues/2341
参考网址
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
来源:MLIST
链接:https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957@%3Cissues.zookeeper.apache.org%3E
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2020.html
来源:MLIST
链接:https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87@%3Cnotifications.zookeeper.apache.org%3E
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:MLIST
链接:https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3297
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3050
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3292
来源:MLIST
链接:https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2@%3Cnotifications.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731@%3Cdev.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560@%3Cissues.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1@%3Cissues.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3@%3Cissues.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E
来源:github.com
链接:https://github.com/FasterXML/jackson-databind/issues/2341
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/
来源:MLIST
链接:https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2937
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190625-0006/
来源:MLIST
链接:https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209@%3Cissues.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2938
来源:MLIST
链接:https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2858
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2935
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2936
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3149
来源:MLIST
链接:https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c@%3Cissues.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4@%3Cnotifications.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324@%3Cnotifications.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682@%3Cnotifications.zookeeper.apache.org%3E
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/
来源:MLIST
链接:https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3046
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3200
来源:MLIST
链接:https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/
来源:MLIST
链接:https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0@%3Cnotifications.zookeeper.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f@%3Cissues.zookeeper.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3044
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3045
来源:MLIST
链接:https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd@%3Ccommits.accumulo.apache.org%3E
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/957491
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1072018
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1072014
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/888271
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1077819
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1118283
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1086039
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1086123
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:2858
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-guardium-data-encryption-gde-3/
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48746
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1074897
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-12814
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-fasterxml-jackson-databind-affect-apache-solr-shipped-with-ibm-operations-analytics-log-analysis/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2235/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4588/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujan2020verbose.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-have-been-identified-in-jackson-databind-library-shipped-with-ibm-global-mailbox/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-identified-in-ibm-storediq/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4237/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/jackson-databind-file-reading-via-Polymorphic-Typing-JSON-Message-29605
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cognos-analytics-has-addressed-multiple-vulnerabilities-3/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1119165
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3643/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1076/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-affects-ibm-jazz-foundation-and-ibm-engineering-products/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3711/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156941/Red-Hat-Security-Advisory-2020-0983-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1440/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-has-announced-a-release-for-ibm-security-identity-governance-and-intelligence-in-response-to-security-vulnerabilities-2/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154665/Red-Hat-Security-Advisory-2019-2937-01.html
受影响实体
暂无
补丁
- FasterXML Jackson jackson-databind 信息泄露漏洞的修复措施<!--2019-6-19-->
还没有评论,来说两句吧...