You are viewing a plain text version of this content. The canonical link for it is here.
Posted to reviews@aurora.apache.org by GitBox <gi...@apache.org> on 2019/09/17 00:23:00 UTC
[GitHub] [aurora] larrycameron80 opened a new issue #77: Deserialization of
Untrusted Data
larrycameron80 opened a new issue #77: Deserialization of Untrusted Data
URL: https://github.com/apache/aurora/issues/77
Deserialization of Untrusted Data
Vulnerable module: com.fasterxml.jackson.core:jackson-databind
Introduced through: com.hubspot.jackson:jackson-datatype-protobuf@0.9.3
Detailed paths
Introduced through: apache/aurora@apache/aurora#ea8e2f4d905e26b3b999e8b59a3cb74a08a3dbf5 › com.hubspot.jackson:jackson-datatype-protobuf@0.9.3 › com.fasterxml.jackson.core:jackson-databind@2.5.1
Remediation: Upgrade to com.hubspot.jackson:jackson-datatype-protobuf@0.9.11-jackson2.9.
Overview
com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.
Affected versions of this package are vulnerable to Deserialization of Untrusted Data. When Default Typing is enabled for an externally exposed JSON endpoint, the service has the mysql-connector-java jar in the classpath. An attacker can host a crafted MySQL server reachable by the victim and send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs due to missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
For queries about this service, please contact Infrastructure at:
users@infra.apache.org
With regards,
Apache Git Services