低危 XML外部实体类似于CVE-2016-3720

CVE编号

CVE-2019-10172

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2019-11-19
漏洞描述
在org.codehaus.jackson:jackson-mapper-asl:1.9.x库中发现一个漏洞。类似CVE-2016-3720的XML外部实体漏洞也影响codehaus jackson-mapper-asl库,但它们属于不同的类。
解决建议
厂商已发布了漏洞修复程序,请及时关注更新:
https://mvnrepository.com/artifact/org.codehaus.jackson
参考链接
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172
https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64...
https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a...
https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264...
https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80...
https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14...
https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad9...
https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a...
https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdf...
https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53...
https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11c...
https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecf...
https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c9...
https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b...
https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d32...
https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c93395...
https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7f...
https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c...
https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8fa...
https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abf...
https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eea...
https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4...
https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2...
https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890...
https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f0...
https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a...
https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b1...
https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df6...
https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc...
https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9...
https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074b...
https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5ded...
https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f09...
https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c102705...
https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b...
https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 fasterxml jackson-mapper-asl * From
(including)
1.9.0
Up to
(including)
1.9.13
运行在以下环境
应用 redhat jboss_enterprise_application_platform 7.0 -
运行在以下环境
应用 redhat jboss_fuse 7.0.0 -
运行在以下环境
系统 debian_10 libjackson-json-java * Up to
(excluding)
1.9.13-2~deb10u1
运行在以下环境
系统 debian_11 libjackson-json-java * Up to
(excluding)
1.9.13-2
运行在以下环境
系统 debian_12 libjackson-json-java * Up to
(excluding)
1.9.13-2
运行在以下环境
系统 debian_8 libjackson-json-java * Up to
(excluding)
1.9.2-3+deb8u1
运行在以下环境
系统 debian_9 libjackson-json-java * Up to
(excluding)
1.9.2-8+deb9u1
运行在以下环境
系统 kylinos_aarch64_V10SP2 jackson * Up to
(excluding)
1.9.11-16.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 jackson * Up to
(excluding)
1.9.11-16.ky10
运行在以下环境
系统 ubuntu_16.04 libjackson-json-java * Up to
(excluding)
1.9.2-7ubuntu0.2
阿里云评分
3.1
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    POC 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-611 XML外部实体引用的不恰当限制(XXE)
阿里云安全产品覆盖情况