Vulnerability Name:

CVE-2018-14720 (CCN-155137)

Assigned:2018-07-27
Published:2018-07-27
Updated:2020-08-31
Summary:FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-611
CWE-502
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2018-14720

Source: REDHAT
Type: Third Party Advisory
RHBA-2019:0959

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:0782

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1106

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1107

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1108

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1140

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1822

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1823

Source: REDHAT
Type: UNKNOWN
RHSA-2019:2858

Source: REDHAT
Type: UNKNOWN
RHSA-2019:3149

Source: REDHAT
Type: UNKNOWN
RHSA-2019:3892

Source: REDHAT
Type: UNKNOWN
RHSA-2019:4037

Source: XF
Type: UNKNOWN
fasterxml-cve201814720-info-disc(155137)

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44

Source: CCN
Type: jackson-databind GIT Repository
Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721) #2097

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://github.com/FasterXML/jackson-databind/issues/2097

Source: CONFIRM
Type: Patch, Release Notes, Third Party Advisory
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7

Source: MLIST
Type: UNKNOWN
[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities

Source: MLIST
Type: Mailing List, Third Party Advisory
[lucene-dev] 20190325 [jira] [Assigned] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...

Source: MLIST
Type: Mailing List, Third Party Advisory
[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...

Source: MLIST
Type: UNKNOWN
[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities

Source: MLIST
Type: Mailing List, Third Party Advisory
[lucene-dev] 20190325 [jira] [Updated] (SOLR-13112) CVE-2018-14718(-14719),sonatype-2017-0312, CVE-2018-14720(-14721) Threat Level 8 Against Solr v7.6. com.fasterxml.jackson.core : jackson-databind : 2.9.6. FasterXML jackson-databind 2.x before 2.9.7 Remote Hackers...

Source: MLIST
Type: UNKNOWN
[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities

Source: MLIST
Type: Mailing List, Third Party Advisory
[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1

Source: MLIST
Type: UNKNOWN
[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12

Source: MLIST
Type: Third Party Advisory
[debian-lts-announce] 20190304 [SECURITY] [DLA 1703-1] jackson-databind security update

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20190527 [SECURITY] [DSA 4452-1] jackson-databind security update

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20190530-0003/

Source: CCN
Type: IBM Security Bulletin 888271 (Security Guardium)
IBM Security Guardium is affected by a jackson-databind vulnerabilities

Source: DEBIAN
Type: Third Party Advisory
DSA-4452

Source: CCN
Type: IBM Security Bulletin 884520 (Global High Availability Mailbox)
Multiple Vulnerabilities in Jackson-Databind Affect IBM Global High Availability Mailbox

Source: CCN
Type: IBM Security Bulletin 2867997 (Rational Rhapsody Design Manager)
Security vulnerabilities affect multiple IBM Rational products based on IBM Jazz technology

Source: CCN
Type: IBM Security Bulletin 6209691 (Sterling B2B Integrator)
Multiple Security Vulnerabilities in Jackson-databind Affect IBM Sterling B2B Integrator

Source: CCN
Type: IBM Security Bulletin 6217807 (Security Identity Governance and Intelligence)
IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6244628 (Rational Publishing Engine)
Third party vulnerable library Jackson-Databind affects IBM Engineering Lifecycle Optimization - Publishing

Source: CCN
Type: IBM Security Bulletin 6320835 (Security Guardium Data Encryption)
Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE)

Source: CCN
Type: IBM Security Bulletin 6324739 (Security Guardium Insights)
IBM Security Guardium Insights is affected by Components with known vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6403331 (Security Guardium Data Encryption)
Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE)

Source: CCN
Type: IBM Security Bulletin 6410462 (Security Trusteer Mobile SDK)
Android Mobile SDK compile builder includes vulnerable components

Source: CCN
Type: IBM Security Bulletin 6444089 (Log Analysis)
Multiple vulnerabilities in FasterXML jackson-databind affect Apache Solr shipped with IBM Operations Analytics - Log Analysis

Source: CCN
Type: IBM Security Bulletin 6593435 (Process Mining)
Vulnerability in jackson-databind affects IBM Process Mining (Multiple CVEs)

Source: CCN
Type: IBM Security Bulletin 6828455 (z/Transaction Processing Facility)
z/Transaction Processing Facility is affected by multiple vulnerabilities in the jackson-databind, jackson-dataformat-xml, jackson-core, slf4j-ext, and cxf-core packages

Source: CCN
Type: IBM Security Bulletin 6840955 (Log Analysis)
Multiple vulnerabilities in Data-Binding for Jackson shipped with IBM Operations Analytics - Log Analysis

Source: CCN
Type: IBM Security Bulletin 6853637 (Sterling B2B Integrator)
B2B API of IBM Sterling B2B Integrator is vulnerable to multiple issues due to FasterXML jackson-databind

Source: CCN
Type: IBM Security Bulletin 6910171 (Integration Designer)
Multiple CVEs affect IBM Integration Designer

Source: CCN
Type: IBM Security Bulletin 6983482 (Security Verify Governance)
IBM Security Verify Governance is vulnerable to a denial of service caused by multiple vulnerabilities.

Source: N/A
Type: UNKNOWN
N/A

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Source: CONFIRM
Type: Patch, Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Source: MISC
Type: UNKNOWN
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.6.0 and < 2.6.7.2)
  • OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.7.0 and < 2.7.9.5)
  • OR cpe:/a:fasterxml:jackson-databind:2.7.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:2.7.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:2.7.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.8.0 and < 2.8.11.3)
  • OR cpe:/a:fasterxml:jackson-databind:2.8.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:2.8.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.9.0 and < 2.9.7)
  • OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr1:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr2:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr3:*:*:*:*:*:*
  • OR cpe:/a:fasterxml:jackson-databind:2.9.0:pr4:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:enterprise_manager_for_virtualization:13.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:financial_services_analytical_applications_infrastructure:8.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:primavera_unifier:*:*:*:*:*:*:*:* (Version >= 17.1 and <= 17.12)
  • OR cpe:/a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:retail_merchandising_system:16.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:fasterxml:jackson-databind:2.9.6:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:security_guardium:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_publishing_engine:6.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_rhapsody_design_manager:6.0.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.0.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_publishing_engine:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:log_analysis:1.3.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:*
  • OR cpe:/a:ibm:integration_designer:20.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.1.1.0:*:*:*:standard:*:*:*
  • OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:6.1.2.0:*:*:*:standard:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.disco:def:2018147200000000
    V
    CVE-2018-14720 on Ubuntu 19.04 (disco) - medium.
    2019-01-02
    oval:com.ubuntu.bionic:def:201814720000
    V
    CVE-2018-14720 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-01-02
    oval:com.ubuntu.cosmic:def:2018147200000000
    V
    CVE-2018-14720 on Ubuntu 18.10 (cosmic) - medium.
    2019-01-02
    oval:com.ubuntu.cosmic:def:201814720000
    V
    CVE-2018-14720 on Ubuntu 18.10 (cosmic) - medium.
    2019-01-02
    oval:com.ubuntu.bionic:def:2018147200000000
    V
    CVE-2018-14720 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-01-02
    oval:com.ubuntu.trusty:def:201814720000
    V
    CVE-2018-14720 on Ubuntu 14.04 LTS (trusty) - medium.
    2019-01-02
    oval:com.ubuntu.xenial:def:2018147200000000
    V
    CVE-2018-14720 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-01-02
    oval:com.ubuntu.xenial:def:201814720000
    V
    CVE-2018-14720 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-01-02
    BACK
    fasterxml jackson-databind *
    fasterxml jackson-databind *
    fasterxml jackson-databind 2.7.0 rc1
    fasterxml jackson-databind 2.7.0 rc2
    fasterxml jackson-databind 2.7.0 rc3
    fasterxml jackson-databind *
    fasterxml jackson-databind 2.8.0 rc1
    fasterxml jackson-databind 2.8.0 rc2
    fasterxml jackson-databind *
    fasterxml jackson-databind 2.9.0 pr1
    fasterxml jackson-databind 2.9.0 pr2
    fasterxml jackson-databind 2.9.0 pr3
    fasterxml jackson-databind 2.9.0 pr4
    debian debian linux 8.0
    debian debian linux 9.0
    oracle banking platform 2.5.0
    oracle banking platform 2.6.0
    oracle banking platform 2.6.1
    oracle banking platform 2.6.2
    oracle communications billing and revenue management 7.5
    oracle communications billing and revenue management 12.0
    oracle enterprise manager for virtualization 13.2.2
    oracle enterprise manager for virtualization 13.2.3
    oracle enterprise manager for virtualization 13.3.1
    oracle financial services analytical applications infrastructure 8.0.2
    oracle financial services analytical applications infrastructure 8.0.3
    oracle financial services analytical applications infrastructure 8.0.4
    oracle financial services analytical applications infrastructure 8.0.5
    oracle financial services analytical applications infrastructure 8.0.6
    oracle financial services analytical applications infrastructure 8.0.7
    oracle jdeveloper 12.1.3.0.0
    oracle jdeveloper 12.2.1.3.0
    oracle primavera unifier 16.1
    oracle primavera unifier 16.2
    oracle primavera unifier *
    oracle primavera unifier 18.8
    oracle retail merchandising system 15.0
    oracle retail merchandising system 16.0
    oracle webcenter portal 12.2.1.3.0
    redhat jboss enterprise application platform 7.2.0
    redhat openshift container platform 3.11
    fasterxml jackson-databind 2.9.6
    ibm security guardium 10.0
    ibm rational rhapsody design manager 6.0
    ibm rational rhapsody design manager 6.0.1
    ibm rational rhapsody design manager 6.0.2
    ibm rational rhapsody design manager 6.0.3
    ibm rational rhapsody design manager 6.0.4
    ibm rational rhapsody design manager 6.0.5
    ibm rational rhapsody design manager 6.0.6
    ibm rational publishing engine 6.0.6
    ibm sterling b2b integrator 6.0.0.0
    ibm sterling b2b integrator 5.2.0.0
    ibm security guardium 10.6
    ibm rational rhapsody design manager 6.0.6.1
    ibm sterling b2b integrator 6.0.3.1
    ibm security identity governance and intelligence 5.2.6
    ibm log analysis 1.3.5.3
    ibm log analysis 1.3.6.0
    ibm log analysis 1.3.1
    ibm log analysis 1.3.2
    ibm log analysis 1.3.3
    ibm log analysis 1.3.4
    ibm log analysis 1.3.5
    ibm log analysis 1.3.6
    ibm rational publishing engine 7.0
    ibm security guardium insights 2.0.1
    ibm security guardium data encryption 3.0.0.2
    ibm log analysis 1.3.6.1
    ibm sterling b2b integrator 6.1.0.0
    ibm integration designer 20.0.0.2
    ibm sterling b2b integrator 6.1.1.0
    ibm security verify governance 10.0
    ibm sterling b2b integrator 6.1.2.0