vulnerability
Red Hat JBoss EAP: CVE-2018-12023: Deserialization of Untrusted Data
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:H/Au:N/C:P/I:P/A:P) | Jun 8, 2018 | Sep 19, 2024 | Jul 2, 2025 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
Jun 8, 2018
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.. A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Oracle JDBC classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-502
- CVE-2018-12023
- https://attackerkb.com/topics/CVE-2018-12023
- URL-https://access.redhat.com/security/cve/CVE-2018-12023
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1671096
- URL-https://access.redhat.com/errata/RHSA-2019:1106
- URL-https://access.redhat.com/errata/RHSA-2019:1107
- URL-https://access.redhat.com/errata/RHSA-2019:1108
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.