CVE-2018-12023

Source
https://cve.org/CVERecord?id=CVE-2018-12023
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-12023.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-12023
Aliases
Downstream
Related
Published
2019-03-21T16:00:12.407Z
Modified
2026-02-09T22:06:43.041469Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.

References

Affected packages

Git / github.com/fasterxml/jackson-databind

Affected versions

jackson-databind-2.*
jackson-databind-2.6.5
jackson-databind-2.6.6
jackson-databind-2.6.7
jackson-databind-2.7.0
jackson-databind-2.7.1
jackson-databind-2.7.1-1
jackson-databind-2.7.2
jackson-databind-2.7.3
jackson-databind-2.7.4
jackson-databind-2.7.5
jackson-databind-2.7.6
jackson-databind-2.7.7
jackson-databind-2.7.8
jackson-databind-2.7.9
jackson-databind-2.7.9.1
jackson-databind-2.7.9.2
jackson-databind-2.7.9.3
jackson-databind-2.7.9.4
jackson-databind-2.8.0
jackson-databind-2.8.1
jackson-databind-2.8.10
jackson-databind-2.8.11
jackson-databind-2.8.11.1
jackson-databind-2.8.2
jackson-databind-2.8.3
jackson-databind-2.8.4
jackson-databind-2.8.5
jackson-databind-2.8.6
jackson-databind-2.8.7
jackson-databind-2.8.8
jackson-databind-2.8.8.1
jackson-databind-2.8.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-12023.json"