Vulnerability Name: CVE-2018-12023 (CCN-151425) Assigned: 2018-10-16 Published: 2018-10-16 Updated: 2020-10-20 Summary: An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H )7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-502 Vulnerability Consequences: Other References: Source: MITRE Type: CNACVE-2018-12023 Source: CCN Type: Oracle CPUApr2019Oracle Critical Patch Update Advisory - April 2019 Source: CCN Type: Oracle CPUJan2019Oracle Critical Patch Update Advisory - January 2019 Source: CCN Type: Oracle CPUJul2019Oracle Critical Patch Update Advisory - July 2019 Source: CCN Type: Oracle CPUOct2018Oracle Critical Patch Update Advisory - October 2018 Source: MISC Type: Third Party Advisory, VDB Entryhttp://www.securityfocus.com/bid/105659 Source: REDHAT Type: Third Party AdvisoryRHBA-2019:0959 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:0782 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:0877 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1106 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1107 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1108 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1140 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1782 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1797 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1822 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1823 Source: REDHAT Type: UNKNOWNRHSA-2019:2804 Source: REDHAT Type: UNKNOWNRHSA-2019:2858 Source: REDHAT Type: UNKNOWNRHSA-2019:3002 Source: REDHAT Type: UNKNOWNRHSA-2019:3140 Source: REDHAT Type: UNKNOWNRHSA-2019:3149 Source: REDHAT Type: UNKNOWNRHSA-2019:3892 Source: REDHAT Type: UNKNOWNRHSA-2019:4037 Source: XF Type: UNKNOWNoracle-cpuoct2018-cve201812023(151425) Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/FasterXML/jackson-databind/issues/2058 Source: MLIST Type: UNKNOWN[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities Source: MLIST Type: UNKNOWN[lucene-issues] 20191004 [GitHub] [lucene-solr] marungo opened a new pull request #925: SOLR-13818: Upgrade jackson to 2.10.0 Source: MLIST Type: UNKNOWN[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities Source: MLIST Type: UNKNOWN[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities Source: MISC Type: Third Party Advisoryhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/ Source: BUGTRAQ Type: Mailing List, Third Party Advisory20190527 [SECURITY] [DSA 4452-1] jackson-databind security update Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20190530-0003/ Source: MISC Type: Technical Description, Third Party Advisoryhttps://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf Source: DEBIAN Type: Third Party AdvisoryDSA-4452 Source: CCN Type: IBM Security Bulletin 2867997 (Rational Rhapsody Design Manager)Security vulnerabilities affect multiple IBM Rational products based on IBM Jazz technology Source: CCN Type: IBM Security Bulletin 6217806 (Security Identity Governance and Intelligence)IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerabilities. Source: CCN Type: IBM Security Bulletin 6244628 (Rational Publishing Engine)Third party vulnerable library Jackson-Databind affects IBM Engineering Lifecycle Optimization - Publishing Source: CCN Type: IBM Security Bulletin 6324739 (Security Guardium Insights)IBM Security Guardium Insights is affected by Components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6340251 (Maximo Asset Management)IBM Maximo Asset Management is vulnerable to Multiple Jackson-Databind CVEs - February 2020 Source: CCN Type: IBM Security Bulletin 6403331 (Security Guardium Data Encryption)Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE) Source: CCN Type: IBM Security Bulletin 6444089 (Log Analysis)Multiple vulnerabilities in FasterXML jackson-databind affect Apache Solr shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6828455 (z/Transaction Processing Facility)z/Transaction Processing Facility is affected by multiple vulnerabilities in the jackson-databind, jackson-dataformat-xml, jackson-core, slf4j-ext, and cxf-core packages Source: CCN Type: IBM Security Bulletin 6840955 (Log Analysis)Multiple vulnerabilities in Data-Binding for Jackson shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6910171 (Integration Designer)Multiple CVEs affect IBM Integration Designer Source: N/A Type: UNKNOWNN/A Source: CCN Type: Oracle CPUJul2020Oracle Critical Patch Update Advisory - July 2020 Source: MISC Type: UNKNOWNhttps://www.oracle.com/security-alerts/cpujul2020.html Source: MISC Type: UNKNOWNhttps://www.oracle.com/security-alerts/cpuoct2020.html Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Source: CONFIRM Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Source: CONFIRM Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2018-12023 Vulnerable Configuration: Configuration 1 :cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.7.0 and < 2.7.9.4)OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.8.0 and < 2.8.11.2) OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.9.0 and < 2.9.6) Configuration 2 :cpe:/o:fedoraproject:fedora:29:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:* Configuration 3 :cpe:/a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:* Configuration 4 :cpe:/a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* OR cpe:/a:redhat:automation_manager:7.3.1:*:*:*:*:*:*:* OR cpe:/a:redhat:decision_manager:7.3.1:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_brms:6.4.10:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:* OR cpe:/a:redhat:single_sign-on:7.3:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:15.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:15.2:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.3.0.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:17.12:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.3.1:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:* OR cpe:/a:oracle:utilities_advanced_spatial_and_operational_analytics:2.7.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_instant_messaging_server:10.0.1.2.0:*:*:*:*:*:*:* AND cpe:/a:ibm:maximo_asset_management:7.6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:maximo_asset_management:7.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.4:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_publishing_engine:7.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:integration_designer:20.0.0.2:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
fasterxml jackson-databind *
fasterxml jackson-databind *
fasterxml jackson-databind *
fedoraproject fedora 29
debian debian linux 9.0
oracle jd edwards enterpriseone tools 9.2
oracle retail merchandising system 15.0
redhat openshift container platform 3.11
redhat automation manager 7.3.1
redhat decision manager 7.3.1
redhat jboss brms 6.4.10
redhat jboss enterprise application platform 7.2.0
redhat single sign-on 7.3
oracle jd edwards enterpriseone tools 9.2
oracle primavera unifier 15.1
oracle primavera unifier 15.2
oracle primavera unifier 16.1
oracle primavera unifier 16.2
oracle utilities framework 4.3.0.3.0
oracle banking platform 2.6
oracle primavera unifier 17.12
oracle banking platform 2.6.1
oracle banking platform 2.6.2
oracle enterprise manager for virtualization 13.2.2
oracle enterprise manager for virtualization 13.2.3
oracle primavera unifier 18.8
oracle enterprise manager for virtualization 13.3.1
oracle retail merchandising system 15.0
oracle utilities framework 4.3.0.6.0
oracle utilities advanced spatial and operational analytics 2.7.0.1
oracle communications instant messaging server 10.0.1.2.0
ibm maximo asset management 7.6.0
ibm rational rhapsody design manager 6.0
ibm rational rhapsody design manager 6.0.1
ibm rational rhapsody design manager 6.0.2
ibm rational rhapsody design manager 6.0.3
ibm rational rhapsody design manager 6.0.4
ibm rational rhapsody design manager 6.0.5
ibm maximo asset management 7.6.1
ibm rational rhapsody design manager 6.0.6
ibm rational publishing engine 6.0.6
ibm rational rhapsody design manager 6.0.6.1
ibm security identity governance and intelligence 5.2.6
ibm log analysis 1.3.5.3
ibm log analysis 1.3.6.0
ibm log analysis 1.3.1
ibm log analysis 1.3.2
ibm log analysis 1.3.3
ibm log analysis 1.3.4
ibm log analysis 1.3.5
ibm log analysis 1.3.6
ibm rational publishing engine 7.0
ibm security guardium insights 2.0.1
ibm security guardium data encryption 3.0.0.2
ibm log analysis 1.3.6.1
ibm integration designer 20.0.0.2