漏洞信息详情
FasterXML jackson-databind 代码问题漏洞
漏洞简介
FasterXML jackson-databind是一个基于JAVA可以将XML和JSON等数据格式与JAVA对象进行转换的库。Jackson可以轻松的将Java对象转换成json对象和xml文档,同样也可以将json、xml转换成Java对象。
FasterXML jackson-databind 2.x系列中2.9.10.6之前版本存在代码问题漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/FasterXML/jackson-databind/issues/2814
参考网址
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200904-0006/
来源:MISC
链接:https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html
来源:N/A
链接:https://www.oracle.com//security-alerts/cpujul2021.html
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:MISC
链接:https://github.com/FasterXML/jackson-databind/issues/2814
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2021.html
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuApr2021.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3558/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-jackson-databind-vulnerability-cve-2020-24616-impacts-ibm-aspera-high-speed-transfer-server-and-aspera-high-speed-transfer-endpoint-versions-prior-to-v4-0/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-jquery-spring-dom4j-mongodb-linux-kernel-targetcli-fb-jackson-node-js-and-apache-commons-affect-ibm-spectrum-protect-plus/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-24616
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.1397
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/FasterXML-Jackson-Databind-code-execution-via-br-com-anteros-Anteros-DBC-33951
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-potential-vulnerability-with-fasterxml-jackson-databind-2/
受影响实体
暂无
补丁
- FasterXML jackson-databind 安全漏洞的修复措施<!--2020-8-25-->
还没有评论,来说两句吧...