严重 FasterXML jackson-databind 反序列化漏洞

CVE编号

CVE-2019-14540

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2019-09-16
漏洞描述
在2.9.10之前的FasterXML jackson-databind中发现了多态键入问题。它与com.zaxxer.hikari.HikariConfig相关。
解决建议
厂商已发布了漏洞修复程序,请及时关注更新:
https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x
参考链接
https://access.redhat.com/errata/RHSA-2019:3200
https://access.redhat.com/errata/RHSA-2020:0159
https://access.redhat.com/errata/RHSA-2020:0160
https://access.redhat.com/errata/RHSA-2020:0161
https://access.redhat.com/errata/RHSA-2020:0164
https://access.redhat.com/errata/RHSA-2020:0445
https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x
https://github.com/FasterXML/jackson-databind/issues/2410
https://github.com/FasterXML/jackson-databind/issues/2449
https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb...
https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb...
https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77...
https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77...
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d...
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d...
https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2...
https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2...
https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e49742771...
https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e49742771...
https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf...
https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf...
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a...
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a...
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec...
https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec...
https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d56...
https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d56...
https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2b...
https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2b...
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34...
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34...
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a70533...
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a70533...
https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd...
https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd...
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be1...
https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be1...
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52...
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52...
https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
https://seclists.org/bugtraq/2019/Oct/6
https://security.netapp.com/advisory/ntap-20191004-0002/
https://www.debian.org/security/2019/dsa-4542
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 fasterxml jackson-databind * Up to
(excluding)
2.9.10
运行在以下环境
系统 alibaba_cloud_linux_3 jackson-databind * Up to
(excluding)
2.9.9.2-1.1.al8
运行在以下环境
系统 debian_10 jackson-databind * Up to
(excluding)
2.9.8-3+deb10u1
运行在以下环境
系统 debian_11 jackson-databind * Up to
(excluding)
2.10.0-1
运行在以下环境
系统 debian_12 jackson-databind * Up to
(excluding)
2.10.0-1
运行在以下环境
系统 debian_8 jackson-databind * Up to
(excluding)
2.4.2-2+deb8u2
运行在以下环境
系统 debian_9 jackson-databind * Up to
(excluding)
2.8.6-1+deb9u6
运行在以下环境
系统 fedora_30 jackson-annotations * Up to
(excluding)
2.10.0-1.fc30
运行在以下环境
系统 fedora_31 jackson-annotations * Up to
(excluding)
2.10.0-1.fc31
阿里云评分
9.1
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    全局影响
  • EXP成熟度
    POC 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    数据泄露
  • 数据完整性
    传输被破坏
  • 服务器危害
    服务器失陷
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-502 可信数据的反序列化
阿里云安全产品覆盖情况