Description
FasterXML Jackson-databind is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain sensitive information that may aid in further attacks. FasterXML jackson-databind versions 2.x through 2.9.9 are vulnerable.
Technologies Affected
- FasterXML jackson-databind 2.0.0
- FasterXML jackson-databind 2.3
- FasterXML jackson-databind 2.4
- FasterXML jackson-databind 2.5
- FasterXML jackson-databind 2.6
- FasterXML jackson-databind 2.6.7.1
- FasterXML jackson-databind 2.7
- FasterXML jackson-databind 2.7.9.1
- FasterXML jackson-databind 2.7.9.3
- FasterXML jackson-databind 2.7.9.4
- FasterXML jackson-databind 2.8
- FasterXML jackson-databind 2.8.10
- FasterXML jackson-databind 2.8.11
- FasterXML jackson-databind 2.8.11.1
- FasterXML jackson-databind 2.8.11.2
- FasterXML jackson-databind 2.8.7
- FasterXML jackson-databind 2.8.8
- FasterXML jackson-databind 2.8.8.1
- FasterXML jackson-databind 2.8.9
- FasterXML jackson-databind 2.9.0
- FasterXML jackson-databind 2.9.1
- FasterXML jackson-databind 2.9.2
- FasterXML jackson-databind 2.9.3
- FasterXML jackson-databind 2.9.4
- FasterXML jackson-databind 2.9.5
- FasterXML jackson-databind 2.9.6
- FasterXML jackson-databind 2.9.7
- FasterXML jackson-databind 2.9.8
- FasterXML jackson-databind 2.9.9
- NetApp OnCommand Unified Manager for Linux 7.3
- NetApp OnCommand Unified Manager for VMware vSphere 9.4
- NetApp OnCommand Unified Manager for Windows 7.3
- NetApp Service Level Manager
- NetApp SnapCenter
- Oracle Clusterware 12.1.0.2.0
- Oracle Clusterware 19.0.0.0.0
- Oracle NoSQL Database
- Redhat Enterprise Linux 8
- Redhat JBoss A-MQ 6.0
- Redhat JBoss BPMS 6.0
- Redhat JBoss EAP 7
- Redhat JBoss Fuse 6.0
- Redhat JBoss Fuse 7.0
- Redhat OpenShift Container Platform 3.10
- Redhat OpenShift Container Platform 3.11
- Redhat OpenShift Container Platform 3.9
- Redhat OpenShift Container Platform 4.1
- Redhat Single Sign-On 7.0
- Redhat Software Collections for RHEL
Recommendations
Block external access at the network boundary, unless external parties require service.
Filter access to the affected computer at the network boundary if global access isnβt needed. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.
Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.
Updates are available. Please see the references or vendor advisory for more information.