Vulnerability Name: CVE-2018-14720 (CCN-155137) Assigned: 2018-07-27 Published: 2018-07-27 Updated: 2020-08-31 Summary: FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization. CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N )4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-611 CWE-502 Vulnerability Consequences: Obtain Information References: Source: MITRE Type: CNACVE-2018-14720 Source: REDHAT Type: Third Party AdvisoryRHBA-2019:0959 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:0782 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1106 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1107 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1108 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1140 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1822 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1823 Source: REDHAT Type: UNKNOWNRHSA-2019:2858 Source: REDHAT Type: UNKNOWNRHSA-2019:3149 Source: REDHAT Type: UNKNOWNRHSA-2019:3892 Source: REDHAT Type: UNKNOWNRHSA-2019:4037 Source: XF Type: UNKNOWNfasterxml-cve201814720-info-disc(155137) Source: CONFIRM Type: Patch, Third Party Advisoryhttps://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44 Source: CCN Type: jackson-databind GIT RepositoryBlock more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721) #2097 Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisoryhttps://github.com/FasterXML/jackson-databind/issues/2097 Source: CONFIRM Type: Patch, Release Notes, Third Party Advisoryhttps://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7 Source: MLIST Type: UNKNOWN[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities Source: MLIST Type: Mailing List, Third Party Advisory[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers... Source: MLIST Type: Mailing List, Third Party Advisory[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers... Source: MLIST Type: UNKNOWN[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities Source: MLIST Type: Mailing List, Third Party Advisory[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers... Source: MLIST Type: UNKNOWN[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities Source: MLIST Type: Mailing List, Third Party Advisory[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1 Source: MLIST Type: UNKNOWN[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12 Source: MLIST Type: Third Party Advisory[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update Source: BUGTRAQ Type: Mailing List, Third Party Advisory20190527 [SECURITY] [DSA 4452-1] jackson-databind security update Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20190530-0003/ Source: CCN Type: IBM Security Bulletin 888271 (Security Guardium)IBM Security Guardium is affected by a jackson-databind vulnerabilities Source: DEBIAN Type: Third Party AdvisoryDSA-4452 Source: CCN Type: IBM Security Bulletin 884520 (Global High Availability Mailbox)Multiple Vulnerabilities in Jackson-Databind Affect IBM Global High Availability Mailbox Source: CCN Type: IBM Security Bulletin 2867997 (Rational Rhapsody Design Manager)Security vulnerabilities affect multiple IBM Rational products based on IBM Jazz technology Source: CCN Type: IBM Security Bulletin 6209691 (Sterling B2B Integrator)Multiple Security Vulnerabilities in Jackson-databind Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6217807 (Security Identity Governance and Intelligence)IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerabilities Source: CCN Type: IBM Security Bulletin 6244628 (Rational Publishing Engine)Third party vulnerable library Jackson-Databind affects IBM Engineering Lifecycle Optimization - Publishing Source: CCN Type: IBM Security Bulletin 6320835 (Security Guardium Data Encryption)Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE) Source: CCN Type: IBM Security Bulletin 6324739 (Security Guardium Insights)IBM Security Guardium Insights is affected by Components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6403331 (Security Guardium Data Encryption)Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE) Source: CCN Type: IBM Security Bulletin 6410462 (Security Trusteer Mobile SDK)Android Mobile SDK compile builder includes vulnerable components Source: CCN Type: IBM Security Bulletin 6444089 (Log Analysis)Multiple vulnerabilities in FasterXML jackson-databind affect Apache Solr shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6593435 (Process Mining)Vulnerability in jackson-databind affects IBM Process Mining (Multiple CVEs) Source: CCN Type: IBM Security Bulletin 6828455 (z/Transaction Processing Facility)z/Transaction Processing Facility is affected by multiple vulnerabilities in the jackson-databind, jackson-dataformat-xml, jackson-core, slf4j-ext, and cxf-core packages Source: CCN Type: IBM Security Bulletin 6840955 (Log Analysis)Multiple vulnerabilities in Data-Binding for Jackson shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6853637 (Sterling B2B Integrator)B2B API of IBM Sterling B2B Integrator is vulnerable to multiple issues due to FasterXML jackson-databind Source: CCN Type: IBM Security Bulletin 6910171 (Integration Designer)Multiple CVEs affect IBM Integration Designer Source: CCN Type: IBM Security Bulletin 6983482 (Security Verify Governance)IBM Security Verify Governance is vulnerable to a denial of service caused by multiple vulnerabilities. Source: N/A Type: UNKNOWNN/A Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Source: CONFIRM Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Source: MISC Type: UNKNOWNhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Vulnerable Configuration: Configuration 1 :cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.6.0 and < 2.6.7.2)OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.7.0 and < 2.7.9.5) OR cpe:/a:fasterxml:jackson-databind:2.7.0:rc1:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:2.7.0:rc2:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:2.7.0:rc3:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.8.0 and < 2.8.11.3) OR cpe:/a:fasterxml:jackson-databind:2.8.0:rc1:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:2.8.0:rc2:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.9.0 and < 2.9.7) OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr1:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr2:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr3:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr4:*:*:*:*:*:* Configuration 2 :cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:* Configuration 3 :cpe:/a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:* OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.3.1:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.3:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.4:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.5:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.6:*:*:*:*:*:*:* OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.7:*:*:*:*:*:*:* OR cpe:/a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_unifier:*:*:*:*:*:*:*:* (Version >= 17.1 and <= 17.12) OR cpe:/a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_merchandising_system:16.0:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* Configuration 4 :cpe:/a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:* OR cpe:/a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:fasterxml:jackson-databind:2.9.6:*:*:*:*:*:*:* AND cpe:/a:ibm:security_guardium:10.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.4:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:rational_publishing_engine:7.0:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:* OR cpe:/a:ibm:integration_designer:20.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.1.1.0:*:*:*:standard:*:*:* OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.1.2.0:*:*:*:standard:*:*:* Denotes that component is vulnerable Oval Definitions BACK
fasterxml jackson-databind *
fasterxml jackson-databind *
fasterxml jackson-databind 2.7.0 rc1
fasterxml jackson-databind 2.7.0 rc2
fasterxml jackson-databind 2.7.0 rc3
fasterxml jackson-databind *
fasterxml jackson-databind 2.8.0 rc1
fasterxml jackson-databind 2.8.0 rc2
fasterxml jackson-databind *
fasterxml jackson-databind 2.9.0 pr1
fasterxml jackson-databind 2.9.0 pr2
fasterxml jackson-databind 2.9.0 pr3
fasterxml jackson-databind 2.9.0 pr4
debian debian linux 8.0
debian debian linux 9.0
oracle banking platform 2.5.0
oracle banking platform 2.6.0
oracle banking platform 2.6.1
oracle banking platform 2.6.2
oracle communications billing and revenue management 7.5
oracle communications billing and revenue management 12.0
oracle enterprise manager for virtualization 13.2.2
oracle enterprise manager for virtualization 13.2.3
oracle enterprise manager for virtualization 13.3.1
oracle financial services analytical applications infrastructure 8.0.2
oracle financial services analytical applications infrastructure 8.0.3
oracle financial services analytical applications infrastructure 8.0.4
oracle financial services analytical applications infrastructure 8.0.5
oracle financial services analytical applications infrastructure 8.0.6
oracle financial services analytical applications infrastructure 8.0.7
oracle jdeveloper 12.1.3.0.0
oracle jdeveloper 12.2.1.3.0
oracle primavera unifier 16.1
oracle primavera unifier 16.2
oracle primavera unifier *
oracle primavera unifier 18.8
oracle retail merchandising system 15.0
oracle retail merchandising system 16.0
oracle webcenter portal 12.2.1.3.0
redhat jboss enterprise application platform 7.2.0
redhat openshift container platform 3.11
fasterxml jackson-databind 2.9.6
ibm security guardium 10.0
ibm rational rhapsody design manager 6.0
ibm rational rhapsody design manager 6.0.1
ibm rational rhapsody design manager 6.0.2
ibm rational rhapsody design manager 6.0.3
ibm rational rhapsody design manager 6.0.4
ibm rational rhapsody design manager 6.0.5
ibm rational rhapsody design manager 6.0.6
ibm rational publishing engine 6.0.6
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm security guardium 10.6
ibm rational rhapsody design manager 6.0.6.1
ibm sterling b2b integrator 6.0.3.1
ibm security identity governance and intelligence 5.2.6
ibm log analysis 1.3.5.3
ibm log analysis 1.3.6.0
ibm log analysis 1.3.1
ibm log analysis 1.3.2
ibm log analysis 1.3.3
ibm log analysis 1.3.4
ibm log analysis 1.3.5
ibm log analysis 1.3.6
ibm rational publishing engine 7.0
ibm security guardium insights 2.0.1
ibm security guardium data encryption 3.0.0.2
ibm log analysis 1.3.6.1
ibm sterling b2b integrator 6.1.0.0
ibm integration designer 20.0.0.2
ibm sterling b2b integrator 6.1.1.0
ibm security verify governance 10.0
ibm sterling b2b integrator 6.1.2.0