中危 FasterXML Jackson-databind MySQL任意文件读取 CVE-2019-12086

CVE编号

CVE-2019-12086

利用情况

漏洞武器化

补丁情况

官方补丁

披露时间

2019-05-18
该漏洞已被黑客武器化,用于大规模蠕虫传播、勒索挖矿,建议您立即关注并修复。
漏洞描述
FasterXML Jackson是美国FasterXML公司的一款适用于Java的数据处理工具。jackson-databind是其中的一个具有数据绑定功能的组件。
在2.9.9之前的FasterXML jackson-databind 2.x中发现了多态键入问题。如果为外部公开的JSON端点启用了“默认类型”(全局或特定属性),则该服务在类路径中具有mysql-connector-java jar(8.0.14或更早版本),攻击者可以托管精心制作的MySQL受害者可以访问服务器,攻击者可以发送精心制作的JSON消息,使他们可以读取服务器上的任意本地文件。发生这种情况是由于缺少com.mysql.cj.jdbc.admin.MiniAdmin验证。

解决建议
升级至安全版本。
参考链接
http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/
http://www.securityfocus.com/bid/109227
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:2935
https://access.redhat.com/errata/RHSA-2019:2936
https://access.redhat.com/errata/RHSA-2019:2937
https://access.redhat.com/errata/RHSA-2019:2938
https://access.redhat.com/errata/RHSA-2019:2998
https://access.redhat.com/errata/RHSA-2019:3044
https://access.redhat.com/errata/RHSA-2019:3045
https://access.redhat.com/errata/RHSA-2019:3046
https://access.redhat.com/errata/RHSA-2019:3050
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3200
https://github.com/FasterXML/jackson-databind/issues/2326
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9
https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e8520684...
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d...
https://lists.apache.org/thread.html/88cd25375805950ae7337e669b0cb0eeda98b960...
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a...
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec...
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34...
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133...
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be1...
https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1...
https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-yo...
https://seclists.org/bugtraq/2019/May/68
https://security.netapp.com/advisory/ntap-20190530-0003/
https://www.debian.org/security/2019/dsa-4452
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.7.0
Up to
(including)
2.7.9.5
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.8.0
Up to
(including)
2.8.11.3
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.9.0
Up to
(excluding)
2.9.9
运行在以下环境
系统 debian_10 jackson-databind * Up to
(excluding)
2.9.8-2
运行在以下环境
系统 debian_11 jackson-databind * Up to
(excluding)
2.9.8-2
运行在以下环境
系统 debian_12 jackson-databind * Up to
(excluding)
2.9.8-2
运行在以下环境
系统 fedora_29 jackson-annotations * Up to
(excluding)
2.9.9-1.fc29
运行在以下环境
系统 fedora_30 jackson-annotations * Up to
(excluding)
2.9.9-1.fc30
运行在以下环境
系统 fedora_31 jackson-annotations * Up to
(excluding)
2.9.9-1.fc31
运行在以下环境
系统 ubuntu_20.04 jackson-databind * Up to
(excluding)
2.9.8-2
运行在以下环境
系统 ubuntu_21.04 jackson-databind * Up to
(excluding)
2.9.8-2
运行在以下环境
系统 ubuntu_21.10 jackson-databind * Up to
(excluding)
2.9.8-2
运行在以下环境
系统 ubuntu_22.04 jackson-databind * Up to
(excluding)
2.9.8-2
运行在以下环境
系统 ubuntu_22.10 jackson-databind * Up to
(excluding)
2.9.8-2
阿里云评分
4.8
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    漏洞武器化
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    10000
CWE-ID 漏洞类型
CWE-502 可信数据的反序列化
阿里云安全产品覆盖情况