-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Another two gadgets to exploit default typing issue in jackson-databind (CVE-2018-5968) #1899
Comments
I am not sure I saw that email. Which address was it from (or what was the title)? |
The title is |
Ok somehow I do not see this via that email address (with that title or any other combination). |
@OneSourceCat Should the latest published version of |
@codelion before assuming anything, make sure to also read: to know under what special conditions vulnerabilities exist. For most Jackson users these are not applicable. |
@cowtowncoder I've already resent the report. My email address is chongrui123[at]gmail.com. |
@OneSourceCat Ah. Gmail decided to put them in SPAM for some weird reason. :-o |
will this fix be added to the 2.8 branch |
Yes, it is in |
thanks! |
OWASP dependency check is still reporting this as vulnerable after updating to 2.8.11.1 |
@arunnc that’s a problem with OWASP dependency check, you can report it to them. |
Hi Asankhaya
Issue is NVD database is not updated with the micro patch 2.8.11.1 version
and fix details.
Would you know how to get this corrected?
On 14-Feb-2018 9:46 PM, "Asankhaya Sharma" <notifications@github.com> wrote:
@arunnc <https://github.com/arunnc> that’s a problem with OWASP dependency
check, you can report it to them.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#1899 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AVtJFfwjs3rlS40kjlDXsT4BmUc7OCveks5tUwbOgaJpZM4Rixed>
.
|
@arunnc In general, we cannot rely on NVD for the accuracy of vulnerable and fix versions. Shameless plug but you can try using https://www.sourceclear.com/ instead. |
@codelion At https://www.sourceclear.com/vulnerability-database/security/remote-code-execution-rce-/java/sid-5732/summary CVE-2018-5968 is referenced as fixed in 2.7.9.3. However, I find it difficult to read that from the commit/code comments related to 2.7.9.3. Could you elaborate on how you've come to the conclusion that 2.7.9.3 is safe (and includes a fix for CVE-2018-5968) ? |
GHSA-w3f4-3q6j-rh82 seems to indicate the version 2.6.7.3 is affected, is it that the advisories data is out of date. What are the steps to update it? |
@ScrapCodes I don't know how github advisories work, what data source they use. If anyone is interested, can point maintainers to https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.6.7.x which points that |
Another 2 gadget types reported against Hibernate, iBatis.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2018-5968
Fixed in:
The text was updated successfully, but these errors were encountered: