CVE-2018-11307

Impact:
Important
Public Date:
2018-05-10
CWE:
CWE-502
Bugzilla:
1677341: CVE-2018-11307 jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis

The MITRE CVE dictionary describes this issue as:

An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.

Find out more about CVE-2018-11307 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat Satellite 6 is not affected by this issue, since Candlepin's java runtime environment does not load MyBatis classes.

Red Hat Virtualization 4 is not affected by this issue, since it does not include MyBatis classes.

Red Hat Fuse 6 and 7 are not directly affected by this issue, as although they do ship the vulnerable jackson-databind component, they do not enable polymorphic deserialization or default typing which are required for exploitability. Their impacts have correspondingly been reduced to Moderate. Future updates may address this flaw.

CVSS v3 metrics

CVSS3 Base Score 5.6
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss BRMS 7.4 RHSA-2019:1822 2019-07-22
Red Hat Software Collections for Red Hat Enterprise Linux 7 (rh-maven35-jackson-databind) RHSA-2019:0782 2019-04-17
Red Hat Single Sign-On 7.3 RHSA-2019:1140 2019-05-09
Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7 RHSA-2019:1108 2019-05-08
Red Hat JBoss EAP 7.2 RHSA-2019:1106 2019-05-08
Red Hat JBoss A-MQ 6.3 RHSA-2019:2804 2019-09-17
Red Hat JBoss BPMS 7.4 RHSA-2019:1823 2019-07-22
Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6 RHSA-2019:1107 2019-05-08
Red Hat JBoss Fuse 6.3 RHSA-2019:2804 2019-09-17
Red Hat OpenShift Application Runtimes 1.0 RHSA-2019:0877 2019-04-24

Affected Packages State

Platform Package State
Red Hat Virtualization 4 rhvm-appliance Not affected
Red Hat Subscription Asset Manager 1 jackson-databind Not affected
Red Hat Single Sign-On 7 jackson-databind Affected
Red Hat Satellite 6 jackson-databind Not affected
Red Hat OpenStack Platform 9.0 opendaylight Not affected
Red Hat OpenStack Platform 8.0 (Liberty) opendaylight Not affected
Red Hat OpenStack Platform 14.0 (Rocky) opendaylight Not affected
Red Hat OpenStack Platform 13.0 (Queens) opendaylight Not affected
Red Hat OpenStack Platform 10 opendaylight Not affected
Red Hat OpenShift Container Platform 4.1 logging-elasticsearch5-container Affected
Red Hat OpenShift Container Platform 3.9 openshift-elasticsearch-plugin Affected
Red Hat OpenShift Container Platform 3.9 elasticsearch-cloud-kubernetes Affected
Red Hat OpenShift Container Platform 3.7 openshift-elasticsearch-plugin Affected
Red Hat OpenShift Container Platform 3.6 openshift-elasticsearch-plugin Affected
Red Hat OpenShift Container Platform 3.11 jackson-databind Not affected
Red Hat OpenShift Container Platform 3.11 logging-elasticsearch5-container Affected
Red Hat OpenShift Container Platform 3.10 elasticsearch-cloud-kubernetes Affected
Red Hat OpenShift Container Platform 3.10 openshift-elasticsearch-plugin Affected
Red Hat Mobile Application Platform On-Premise 4 jackson-databind Not affected
Red Hat JBoss Operations Network 3 Core Server Not affected
Red Hat JBoss Fuse 7 jackson-databind Affected
Red Hat JBoss EAP 6 jackson-databind Not affected
Red Hat JBoss Data Virtualization 6 jackson-databind Affected
Red Hat JBoss Data Grid 7 jackson-databind Affected
Red Hat JBoss BRMS 6 jackson-databind Will not fix
Red Hat JBoss BPMS 6 jackson-databind Affected
Red Hat Enterprise Linux 8 jackson-databind Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Last Modified

CVE description copyright © 2017, The MITRE Corporation