严重 FasterXML jackson-databind 至 2.9.10.2 反序列化漏洞

CVE编号

CVE-2020-8840

利用情况

EXP 已公开

补丁情况

官方补丁

披露时间

2020-02-11
该漏洞EXP已公开传播,漏洞利用成本极低,建议您立即关注并修复。
漏洞描述
FasterXML jackson-databind是一个简单基于Java应用库,Jackson可以轻松的将Java对象转换成json对象和xml文档,同样也可以将json、xml转换成Java对象。jackson-databind 2.0.0-2.9.10.2版本,由于缺少某些xbean-reflect/JNDI黑名单类,如org.apache.xbean.propertyeditor.JndiConverter,可导致攻击者使用JNDI注入的方式实现远程代码执行。<br>
解决建议
下载相关补丁
参考链接
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en
https://github.com/FasterXML/jackson-databind/issues/2620
https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb466...
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a70533...
https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb982...
https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b0...
https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4eb...
https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda...
https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c5...
https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169...
https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe76...
https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f31486900...
https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d6...
https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f5...
https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119...
https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c70...
https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de0...
https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8f...
https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb...
https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553...
https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc09304...
https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f437...
https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba914207...
https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a51...
https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae5...
https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db28...
https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5...
https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f...
https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b73...
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5...
https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71...
https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc...
https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f...
https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a...
https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e7969...
https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11...
https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9e...
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52...
https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbb...
https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec2...
https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html
https://security.netapp.com/advisory/ntap-20200327-0002/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 fasterxml jackson-databind * From
(including)
2.0.0
Up to
(including)
2.9.10.2
运行在以下环境
系统 debian_10 jackson-databind * Up to
(excluding)
2.9.8-3+deb10u2
运行在以下环境
系统 debian_11 jackson-databind * Up to
(excluding)
2.11.1-1
运行在以下环境
系统 debian_12 jackson-databind * Up to
(excluding)
2.11.1-1
运行在以下环境
系统 debian_8 jackson-databind * Up to
(excluding)
2.4.2-2+deb8u2
运行在以下环境
系统 debian_9 jackson-databind * Up to
(excluding)
2.8.6-1+deb9u7
阿里云评分
9.4
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    全局影响
  • EXP成熟度
    EXP 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    数据泄露
  • 数据完整性
    传输被破坏
  • 服务器危害
    服务器失陷
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-502 可信数据的反序列化
阿里云安全产品覆盖情况