低危 Oracle JD Edwards EnterpriseOne Tools 9.2 Monitoring/Diagnostics SEC 输入验证漏洞

CVE编号

CVE-2019-14379

利用情况

暂无

补丁情况

官方补丁

披露时间

2019-07-30
漏洞描述
使用ehcache时,2.9.9.2之前的FasterXML jackson-databind中的SubTypeValidator.java错误处理默认输入,导致远程代码执行。<br>
解决建议
厂商已发布了漏洞修复程序,请及时关注更新:
https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2
参考链接
http://seclists.org/fulldisclosure/2022/Mar/23
https://access.redhat.com/errata/RHBA-2019:2824
https://access.redhat.com/errata/RHSA-2019:2743
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:2935
https://access.redhat.com/errata/RHSA-2019:2936
https://access.redhat.com/errata/RHSA-2019:2937
https://access.redhat.com/errata/RHSA-2019:2938
https://access.redhat.com/errata/RHSA-2019:2998
https://access.redhat.com/errata/RHSA-2019:3044
https://access.redhat.com/errata/RHSA-2019:3045
https://access.redhat.com/errata/RHSA-2019:3046
https://access.redhat.com/errata/RHSA-2019:3050
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3200
https://access.redhat.com/errata/RHSA-2019:3292
https://access.redhat.com/errata/RHSA-2019:3297
https://access.redhat.com/errata/RHSA-2019:3901
https://access.redhat.com/errata/RHSA-2020:0727
https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9....
https://github.com/FasterXML/jackson-databind/issues/2387
https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9...
https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb...
https://lists.apache.org/thread.html/2766188be238a446a250ef76801037d452979152...
https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2d...
https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37...
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d...
https://lists.apache.org/thread.html/525bcf949a4b0da87a375cbad2680b8beccde749...
https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f...
https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df...
https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244e...
https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99f...
https://lists.apache.org/thread.html/689c6bcc6c7612eee71e453a115a4c8581e7b718...
https://lists.apache.org/thread.html/75f482fdc84abe6d0c8f438a76437c335a7bbeb5...
https://lists.apache.org/thread.html/859815b2e9f1575acbb2b260b73861c16ca49bca...
https://lists.apache.org/thread.html/8723b52c2544e6cb804bc8a36622c584acd1bd6c...
https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5...
https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a6...
https://lists.apache.org/thread.html/99944f86abefde389da9b4040ea2327c6aa0b53a...
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a...
https://lists.apache.org/thread.html/d161ff3d59c5a8213400dd6afb1cce1fac4f687c...
https://lists.apache.org/thread.html/e25e734c315f70d8876a846926cfe3bfa1a48880...
https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284e...
https://lists.apache.org/thread.html/f17f63b0f8a57e4a5759e01d25cffc0548f0b61f...
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34...
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a70533...
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52...
https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.netapp.com/advisory/ntap-20190814-0001/
https://support.apple.com/kb/HT213189
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.7.0
Up to
(excluding)
2.7.9.6
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.8.0
Up to
(excluding)
2.8.11.4
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.9.0
Up to
(excluding)
2.9.9.2
运行在以下环境
应用 netapp oncommand_workflow_automation - -
运行在以下环境
应用 netapp snapcenter - -
运行在以下环境
系统 debian_10 jackson-databind * Up to
(excluding)
2.9.8-3+deb10u1
运行在以下环境
系统 debian_11 jackson-databind * Up to
(excluding)
2.9.9.3-1
运行在以下环境
系统 debian_12 jackson-databind * Up to
(excluding)
2.9.9.3-1
运行在以下环境
系统 debian_8 jackson-databind * Up to
(excluding)
2.4.2-2+deb8u2
运行在以下环境
系统 debian_9 jackson-databind * Up to
(excluding)
2.8.6-1+deb9u6
运行在以下环境
系统 fedora_29 jackson-annotations * Up to
(excluding)
2.9.9-1.fc29
运行在以下环境
系统 fedora_30 jackson-annotations * Up to
(excluding)
2.9.9-1.fc30
运行在以下环境
系统 fedora_31 jackson-annotations * Up to
(excluding)
2.9.9-1.fc31
阿里云评分
3.1
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CWE-915 动态确定对象属性修改的控制不恰当
阿里云安全产品覆盖情况