Lucene search

K
cve[email protected]CVE-2019-12017
HistoryOct 24, 2019 - 3:15 p.m.

CVE-2019-12017

2019-10-2415:15:31
CWE-502
web.nvd.nist.gov
46
cve-2019-12017
remote code execution
mapr
cldb
json framework
java class
urlclassloader
jackson library
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.018 Low

EPSS

Percentile

88.1%

A remote code execution vulnerability exists in MapR CLDB code, specifically in the JSON framework that is used in the CLDB code that handles login and ticket issuance. An attacker can use the ‘class’ property of the JSON request sent to the CLDB to influence the JSON library’s decision on which Java class this JSON request is deserialized to. By doing so, the attacker can force the MapR CLDB to construct a URLClassLoader which loads a malicious Java class from a remote path and instantiate this object in the MapR CLDB, thus executing arbitrary code on the machine running the MapR CLDB and take over the cluster. By switching to the newer Jackson library and ensuring that all incoming JSON requests are only deserialized to the same class that it was serialized from, the vulnerability is fixed. This vulnerability affects the entire MapR core platform.

Affected configurations

NVD
Node
maprmaprRange<5.2.2
CPENameOperatorVersion
mapr:maprmaprlt5.2.2

CNA Affected

[
  {
    "product": "MapR-MFS/CLDB",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "v5.2.2, v6.0.0, v6.0.1, v6.1.0 of MapR without MFS-2025 patch"
      }
    ]
  }
]

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.018 Low

EPSS

Percentile

88.1%

Related for CVE-2019-12017