You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tinkerpop.apache.org by "Stephen Mallette (Jira)" <ji...@apache.org> on 2022/02/15 20:05:00 UTC

[jira] [Closed] (TINKERPOP-2678) jackson-databind medium security issue identified

     [ https://issues.apache.org/jira/browse/TINKERPOP-2678?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Stephen Mallette closed TINKERPOP-2678.
---------------------------------------
    Fix Version/s: 3.6.0
         Assignee: Stephen Mallette
       Resolution: Fixed

Fixed via ctr on: https://github.com/apache/tinkerpop/commit/60f5dd89e7ec68bdb1bf7b1351b4da40f775afc3

> jackson-databind medium security issue identified
> -------------------------------------------------
>
>                 Key: TINKERPOP-2678
>                 URL: https://issues.apache.org/jira/browse/TINKERPOP-2678
>             Project: TinkerPop
>          Issue Type: Improvement
>          Components: server
>    Affects Versions: 3.5.0
>            Reporter: Aaron Coady
>            Assignee: Stephen Mallette
>            Priority: Major
>             Fix For: 3.6.0
>
>
> com.fasterxml.jackson.core_jackson-databind version 2.11.3 has this security issue identified. The resolution is in versions 2.14, 2.13.1 and 2.12.6
>  
> [https://github.com/FasterXML/jackson-databind/issues/3328]
>  
> Issue summary:
> jackson-databind in certain versions from 2.10 is vulnerable to DoS attack, only when using JDK serialization to serialize, deserialize JsonNode values. An attacker can provide a 4-byte length payload, with the value of Integer.MAX_VALUE, that will cause the decoder to allocate a large buffer leading to out of heap memory - especially so if the attacker manages to inject multiple broken messages.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)