logo
DATABASE RESOURCES PRICING ABOUT US

Server-Side Request Forgery (SSRF) in jackson-databind

Description

FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.


Affected Software


CPE Name Name Version
com.fasterxml.jackson.core:jackson-databind 2.7.0
com.fasterxml.jackson.core:jackson-databind 2.7.1
com.fasterxml.jackson.core:jackson-databind 2.7.1-1
com.fasterxml.jackson.core:jackson-databind 2.7.2
com.fasterxml.jackson.core:jackson-databind 2.7.3
com.fasterxml.jackson.core:jackson-databind 2.7.4
com.fasterxml.jackson.core:jackson-databind 2.7.5
com.fasterxml.jackson.core:jackson-databind 2.7.6
com.fasterxml.jackson.core:jackson-databind 2.7.7
com.fasterxml.jackson.core:jackson-databind 2.7.8
com.fasterxml.jackson.core:jackson-databind 2.7.9
com.fasterxml.jackson.core:jackson-databind 2.7.9.1
com.fasterxml.jackson.core:jackson-databind 2.7.9.2
com.fasterxml.jackson.core:jackson-databind 2.7.9.3
com.fasterxml.jackson.core:jackson-databind 2.7.9.4

Related