Updated jackson-databind packages fix security vulnerabilities
Publication date: 27 Mar 2021Modification date: 27 Mar 2021
Type: security
Affected Mageia releases : 7
CVE: CVE-2019-12086 , CVE-2019-12384 , CVE-2019-12814 , CVE-2019-14379 , CVE-2019-14439 , CVE-2019-14540 , CVE-2019-16335 , CVE-2019-16942 , CVE-2019-16943 , CVE-2019-17267 , CVE-2019-17531 , CVE-2019-20330 , CVE-2020-8840 , CVE-2020-9546 , CVE-2020-9547 , CVE-2020-9548 , CVE-2020-10672 , CVE-2020-10673 , CVE-2020-10968 , CVE-2020-10969 , CVE-2020-11111 , CVE-2020-11112 , CVE-2020-11113 , CVE-2020-11619 , CVE-2020-11620 , CVE-2020-14060 , CVE-2020-14061 , CVE-2020-14062 , CVE-2020-14195 , CVE-2020-25649 , CVE-2020-35728 , CVE-2021-20190
Description
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation (CVE-2019-12086). FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible (CVE-2019-12384). A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server (CVE-2019-12814). SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution (CVE-2019-14379). A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath (CVE-2019-14439). A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig (CVE-2019-14540). A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540 (CVE-2019-16335). A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling (CVE-2019-16942). A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling (CVE-2019-16943). A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup (CVE-2019-17267). A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload (CVE-2019-17531). FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking (CVE-2019-20330). FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter (CVE-2020-8840). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config) (CVE-2020-9546). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap) (CVE-2020-9547). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core) (CVE-2020-9548). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms) (CVE-2020-10672). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus) (CVE-2020-10673). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy) (CVE-2020-10968). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane (CVE-2020-10969). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms) (CVE-2020-11111). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy) (CVE-2020-11112). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa) (CVE-2020-11113). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop) (CVE-2020-11619). FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly) (CVE-2020-11620). FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill) (CVE-2020-14060). FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms). (CVE-2020-14061). FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2) (CVE-2020-14062). FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity) (CVE-2020-14195). A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity (CVE-2020-25649). FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl) (CVE-2020-35728). A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability (CVE-2021-20190).
References
- https://bugs.mageia.org/show_bug.cgi?id=25266
- https://www.debian.org/security/2019/dsa-4452
- https://www.debian.org/security/2019/dsa-4542
- https://www.debian.org/lts/security/2019/dla-2030
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4JYW4U272JPM7AYVNENNTWYYYAAQ4TZO/
- https://www.debian.org/lts/security/2020/dla-2111
- https://www.debian.org/lts/security/2020/dla-2135
- https://www.debian.org/lts/security/2020/dla-2153
- https://www.debian.org/lts/security/2020/dla-2179
- https://access.redhat.com/errata/RHSA-2020:1523
- https://www.debian.org/lts/security/2020/dla-2406
- https://access.redhat.com/errata/RHSA-2020:4366
- https://lists.suse.com/pipermail/sle-security-updates/2021-January/008253.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/6X2UT4X6M7DLQYBOOHMXBWGYJ65RL2CT/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12814
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25649
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35728
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20190
SRPMS
7/core
- jackson-databind-2.9.8-1.2.mga7