vulnerability
Red Hat OpenShift: CVE-2018-11307: jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jul 9, 2019 | Oct 8, 2019 | Apr 14, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 9, 2019
Added
Oct 8, 2019
Modified
Apr 14, 2025
Description
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
Solution
linuxrpm-upgrade-logging
References
- CVE-2018-11307
- https://attackerkb.com/topics/CVE-2018-11307
- REDHAT-RHSA-2019:0782
- REDHAT-RHSA-2019:0877
- REDHAT-RHSA-2019:1106
- REDHAT-RHSA-2019:1107
- REDHAT-RHSA-2019:1108
- REDHAT-RHSA-2019:1140
- REDHAT-RHSA-2019:1822
- REDHAT-RHSA-2019:1823
- REDHAT-RHSA-2019:2804
- REDHAT-RHSA-2019:2858
- REDHAT-RHSA-2019:3002
- REDHAT-RHSA-2019:3140
- REDHAT-RHSA-2019:3149
- REDHAT-RHSA-2019:3892
- REDHAT-RHSA-2019:4037

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.