CVE-2017-15095

Impact:
Important
Public Date:
2017-11-02
CWE:
CWE-184
Bugzilla:
1506612: CVE-2017-15095 jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.

Find out more about CVE-2017-15095 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellitw 6.x. However the affected code is NOT used at this time: Candlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected. However as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.

CVSS v3 metrics

CVSS3 Base Score 8.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7) (rh-eclipse47-jackson-databind) RHSA-2017:3189 2017-11-13
Red Hat Software Collections for Red Hat Enterprise Linux 7 (rh-eclipse46-jackson-databind) RHSA-2017:3190 2017-11-13

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 jackson-databind Will not fix
Red Hat Software Collections for Red Hat Enterprise Linux rh-maven35-jackson-databind Affected
Red Hat Satellite 6 jackson-databind Affected
Red Hat OpenShift Enterprise 2 jackson-databind Not affected
Red Hat Mobile Application Platform On-Premise 4 jackson-databind Not affected
Red Hat JBoss Operations Network 3 Core Server Not affected
Red Hat JBoss Fuse 6 jackson-databind Not affected
Red Hat JBoss EAP 7 jackson-databind Affected
Red Hat JBoss EAP 6 jackson-databind Affected
Red Hat JBoss Data Virtualization 6 jackson-databind Not affected
Red Hat JBoss Data Grid 7 jackson-databind Not affected
Red Hat JBoss BRMS 6 jackson-databind Not affected
Red Hat JBoss BPMS 6 jackson-databind Not affected
Red Hat JBoss A-MQ 6 jackson-databind Not affected
RHEV-M for Servers jasperreports-server-pro Will not fix
RHEV-M 4.0 eap7-jackson-databind Affected

Acknowledgements

Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting this issue.

Mitigation

Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.