严重 FasterXML jackson-databind 代码问题漏洞(CVE-2019-12384)

CVE编号

CVE-2019-12384

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2019-06-25
漏洞描述
FasterXML Jackson是美国FasterXML公司的一款适用于Java的数据处理工具。jackson-databind是其中的一个具有数据绑定功能的组件。FasterXML jackson-databind 2.9.9.1之前的2.x版本中存在代码问题漏洞。攻击者可利用该漏洞执行代码或造成其他危害。
解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/FasterXML/jackson-databind/commit/c9ef4a10d6f6633cf470d6a469514b68fa2be234
参考链接
https://access.redhat.com/errata/RHSA-2019:1820
https://access.redhat.com/errata/RHSA-2019:2720
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:2935
https://access.redhat.com/errata/RHSA-2019:2936
https://access.redhat.com/errata/RHSA-2019:2937
https://access.redhat.com/errata/RHSA-2019:2938
https://access.redhat.com/errata/RHSA-2019:2998
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3200
https://access.redhat.com/errata/RHSA-2019:3292
https://access.redhat.com/errata/RHSA-2019:3297
https://access.redhat.com/errata/RHSA-2019:3901
https://access.redhat.com/errata/RHSA-2019:4352
https://blog.doyensec.com/2019/07/22/jackson-gadgets.html
https://doyensec.com/research.html
https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad
https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9...
https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9...
https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2d...
https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2d...
https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37...
https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37...
https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e8520684...
https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e8520684...
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d...
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d...
https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f...
https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f...
https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df...
https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df...
https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244e...
https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244e...
https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5...
https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5...
https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a6...
https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a6...
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a...
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a...
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec...
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec...
https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f6...
https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f6...
https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284e...
https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284e...
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34...
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34...
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be1...
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be1...
https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://seclists.org/bugtraq/2019/Oct/6
https://security.netapp.com/advisory/ntap-20190703-0002/
https://www.debian.org/security/2019/dsa-4542
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.7.0
Up to
(including)
2.7.9.5
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.8.0
Up to
(including)
2.8.11.3
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.9.0
Up to
(excluding)
2.9.9.1
运行在以下环境
系统 alibaba_cloud_linux_3 jackson-databind * Up to
(excluding)
2.9.9.2-1.1.al8
运行在以下环境
系统 debian_10 jackson-databind * Up to
(excluding)
2.9.8-3
运行在以下环境
系统 debian_11 jackson-databind * Up to
(excluding)
2.9.8-3
运行在以下环境
系统 debian_12 jackson-databind * Up to
(excluding)
2.9.8-3
运行在以下环境
系统 fedora_29 jackson-annotations * Up to
(excluding)
2.9.9-1.fc29
运行在以下环境
系统 fedora_30 jackson-annotations * Up to
(excluding)
2.9.9-1.fc30
运行在以下环境
系统 fedora_31 jackson-annotations * Up to
(excluding)
2.9.9-1.fc31
运行在以下环境
系统 ubuntu_20.04 jackson-databind * Up to
(excluding)
2.9.8-3
运行在以下环境
系统 ubuntu_21.04 jackson-databind * Up to
(excluding)
2.9.8-3
运行在以下环境
系统 ubuntu_21.10 jackson-databind * Up to
(excluding)
2.9.8-3
运行在以下环境
系统 ubuntu_22.04 jackson-databind * Up to
(excluding)
2.9.8-3
运行在以下环境
系统 ubuntu_22.10 jackson-databind * Up to
(excluding)
2.9.8-3
阿里云评分
9.1
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    全局影响
  • EXP成熟度
    POC 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    数据泄露
  • 数据完整性
    传输被破坏
  • 服务器危害
    服务器失陷
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-502 可信数据的反序列化
阿里云安全产品覆盖情况