Skip to content

Server-Side Request Forgery (SSRF) in jackson-databind

Critical severity GitHub Reviewed Published Jan 4, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

maven com.fasterxml.jackson.core:jackson-databind (Maven)

Affected versions

>= 2.9.0, < 2.9.7
>= 2.8.0, <= 2.8.11.2
>= 2.7.0, <= 2.7.9.4

Patched versions

2.9.7
2.8.11.3
2.7.9.5

Description

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.

References

Published to the GitHub Advisory Database Jan 4, 2019
Reviewed Jun 16, 2020
Last updated Jan 9, 2023

Severity

Critical
10.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2018-14721

GHSA ID

GHSA-9mxf-g3x6-wv74

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.