Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Block one more gadget type (logback, CVE-2019-12384) #2334

Closed
cowtowncoder opened this issue May 28, 2019 · 10 comments
Closed

Block one more gadget type (logback, CVE-2019-12384) #2334

cowtowncoder opened this issue May 28, 2019 · 10 comments
Labels
CVE Issues related to public CVEs (security vuln reports)
Milestone

Comments

@cowtowncoder
Copy link
Member

cowtowncoder commented May 28, 2019

A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was CVE-2019-12384.
CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12384 for full details, but the specific variation (in addition to needing "default typing", attacker being able to craft specific json message) is that:

  • If service has jar logback-classic in its classpath

vulnerability applies.


Fixed in:

  • 2.9.10
  • 2.8.11.4
  • 2.7.9.6
  • 2.6.7.3
@cowtowncoder cowtowncoder added 2.9 CVE Issues related to public CVEs (security vuln reports) labels May 28, 2019
@hwwxj
Copy link

hwwxj commented Jun 11, 2019

Excuse me, may I ask when will this issue be solved?

@cowtowncoder
Copy link
Member Author

I hope to have to work on this (and perhaps the other CVE to file) later this week.

@cowtowncoder cowtowncoder added this to the 2.9.9.1 milestone Jun 13, 2019
@cowtowncoder
Copy link
Member Author

Fixed in 2.9 (for likely micro-patch 2.9.9.1), as well as backported in 2.8 and 2.7 (in case new versions might be released; or to make it easier for users to build from those branches).

@hwwxj
Copy link

hwwxj commented Jun 17, 2019

ok, thank you very much. By the way, when will the patch 2.9.9.1 be released? we need this urgently.

@cowtowncoder
Copy link
Member Author

I'll be going on vacation later today, back on July 1st, so at earliest in early July (but possibly mid-July, depending on if it'll be 2.9.10 or 2.9.9.1).

@cowtowncoder
Copy link
Member Author

Release 2.9.9.1 in-progress.

@jebeaudet
Copy link

@cowtowncoder Are you planning on releasing a 2.9.9.1 for the jackson-bom artifact containing this jackson-databind release? Thanks

scottfrederick pushed a commit to spring-cloud/spring-cloud-connectors that referenced this issue Jul 5, 2019
@cowtowncoder
Copy link
Member Author

@jebeaudet I am bit on fence on that -- if you would find it useful, please file an issue and I can create one?

@hwwxj
Copy link

hwwxj commented Aug 5, 2019

Excuse me, may I ask when will jackson 2.9.10 be released?

@cowtowncoder
Copy link
Member Author

@hwwxj Not clear yet -- not enough bug fixes to warrant full release. But micro-patches 2.9.9.1 and 2.9.9.2 exist with the fix (plus there will be imminent 2.9.9.3 to address #2395 that was included in 2.9.9.2).

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
CVE Issues related to public CVEs (security vuln reports)
Projects
None yet
Development

No branches or pull requests

3 participants