You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@activemq.apache.org by "Christopher L. Shannon (JIRA)" <ji...@apache.org> on 2018/07/24 10:29:00 UTC

[jira] [Assigned] (AMQ-6992) ActiveMQ 5.15.4 jackson-databind-2.9.4.jar which has one high severity CVEs against it.

     [ https://issues.apache.org/jira/browse/AMQ-6992?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Christopher L. Shannon reassigned AMQ-6992:
-------------------------------------------

    Assignee: Christopher L. Shannon

> ActiveMQ 5.15.4 jackson-databind-2.9.4.jar which has one high severity CVEs against it.
> ---------------------------------------------------------------------------------------
>
>                 Key: AMQ-6992
>                 URL: https://issues.apache.org/jira/browse/AMQ-6992
>             Project: ActiveMQ
>          Issue Type: Bug
>          Components: activemq-leveldb-store
>    Affects Versions: 5.15.4
>         Environment: Environment: Customer environment is a mix of Linux and Windows, Gig-LAN (Medical & Finacial services).  Will not accept the risk of having even one high severity CVE in thier environment. The cost of (SOX/HIPPA) insurence is too high to allow even one CVE with newly deployed systems.
>            Reporter: Albert Baker
>            Assignee: Christopher L. Shannon
>            Priority: Blocker
>
> ctiveMQ 5.15.4 jackson-databind-2.9.4.jar which has one high severity CVEs against it.
> Discovered by adding OWASP Dependency check into ActiveMQ pom.xml and running the OWASP report.
> CVE-2018-7489 Severity:High     CVSS Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
> CWE: CWE-184 Incomplete Blacklist
> FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525
> deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the
> c3p0 libraries are available in the classpath.
> BID - 103203
> CONFIRM - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
> CONFIRM - https://github.com/FasterXML/jackson-databind/issues/1931
> CONFIRM - https://security.netapp.com/advisory/ntap-20180328-0001/
> DEBIAN - DSA-4190
> REDHAT - RHSA-2018:1447
> REDHAT - RHSA-2018:1448
> REDHAT - RHSA-2018:1449
> REDHAT - RHSA-2018:1450
> REDHAT - RHSA-2018:1451
> REDHAT - RHSA-2018:1786
> SECTRACK - 1040693
> Vulnerable Software & Versions: (show all)
> cpe:/a:fasterxml:jackson-databind:2.9.4



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)