An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
[
{
"id": "CVE-2018-12022-e06040f4",
"source": "https://github.com/fasterxml/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a",
"digest": {
"line_hashes": [
"128796644907170208752938553446425314383",
"115869816375365235010073422641981820603",
"242058207014165142330415616712348705206"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "src/main/java/com/fasterxml/jackson/databind/jsontype/impl/SubTypeValidator.java"
},
"signature_type": "Line",
"deprecated": false
}
]