-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Block one more gadget type (jodd-db, CVE-2018-12022) #2052
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
cowtowncoder
added a commit
that referenced
this issue
Jun 1, 2018
…gadgets, but they seem suspicious enough to block tentatively
@cowtowncoder - what was your finding here is it really an issue and if yes - are you planning to fix it in the upcoming 2.9.6 release? |
Fix committed earlier as:
and is included in versions:
once released. |
cowtowncoder
added a commit
that referenced
this issue
Jun 8, 2018
Closed
This was referenced Jun 25, 2019
This was referenced Aug 12, 2019
This was referenced Aug 22, 2019
This was referenced Aug 29, 2019
ablekhman
added a commit
to atlassian/jackson-1
that referenced
this issue
Oct 23, 2019
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
There is a potential remote code execution (RCE) vulnerability, if user is
java.lang.Object
jodd-db
(https://jodd.org/db/) jar in classpath(note: steps 1 and 2 are common steps as explained in https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062)
To solve the issue, one type from Jodd database component is blacklisted to avoid their use as "serialization gadgets".
Original vulnerability discoverer:
吴桂雄 Wuguixiong
Fixed in:
The text was updated successfully, but these errors were encountered: