You are viewing a plain text version of this content. The canonical link for it is here.
Posted to reviews@aurora.apache.org by GitBox <gi...@apache.org> on 2019/09/17 00:23:00 UTC

[GitHub] [aurora] larrycameron80 opened a new issue #77: Deserialization of Untrusted Data

larrycameron80 opened a new issue #77: Deserialization of Untrusted Data
URL: https://github.com/apache/aurora/issues/77
 
 
   Deserialization of Untrusted Data
   Vulnerable module: com.fasterxml.jackson.core:jackson-databind
   Introduced through: com.hubspot.jackson:jackson-datatype-protobuf@0.9.3
   Detailed paths
   Introduced through: apache/aurora@apache/aurora#ea8e2f4d905e26b3b999e8b59a3cb74a08a3dbf5 › com.hubspot.jackson:jackson-datatype-protobuf@0.9.3 › com.fasterxml.jackson.core:jackson-databind@2.5.1
   Remediation: Upgrade to com.hubspot.jackson:jackson-datatype-protobuf@0.9.11-jackson2.9.
   Overview
   com.fasterxml.jackson.core:jackson-databind is a library which contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor.
   
   Affected versions of this package are vulnerable to Deserialization of Untrusted Data. When Default Typing is enabled for an externally exposed JSON endpoint, the service has the mysql-connector-java jar in the classpath. An attacker can host a crafted MySQL server reachable by the victim and send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs due to missing com.mysql.cj.jdbc.admin.MiniAdmin validation.

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services