Description
FasterXML Jackson-databind is prone to a remote-code execution vulnerability. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. Failed exploits will result in denial-of-service conditions. FasterXML jackson-databind version 2.0.0 through 2.9.10 are vulnerable.
Technologies Affected
- Cisco Enterprise Chat and Email 12.0(1)
- Cisco FirePOWER Management Center 6.2.1
- Cisco FirePOWER Management Center 6.2.2
- Cisco FirePOWER Management Center 6.6.0
- Cisco Network Level Service 1.7(1.46)
- Cisco Webex Teams WBS39.11.0
- Cloud Foundry UAA 63.0
- Cloud Foundry UAA 64.0
- Cloud Foundry UAA 72.0
- Cloud Foundry UAA 73.0.0
- Cloud Foundry UAA 73.3.0
- Cloud Foundry UAA 73.4.0
- Cloud Foundry UAA 73.4.2
- Cloud Foundry UAA 74.0.0
- Cloud Foundry UAA 74.3.0
- Cloud Foundry UAA 74.5.0
- Cloud Foundry cf-deployment 0.35.0
- Cloud Foundry cf-deployment 0.36.0
- Cloud Foundry cf-deployment 10.0.0
- Cloud Foundry cf-deployment 10.1.0
- Cloud Foundry cf-deployment 11.0.0
- Cloud Foundry cf-deployment 11.1.0
- Cloud Foundry cf-deployment 12.2.0
- Cloud Foundry cf-deployment 12.3.0
- Cloud Foundry cf-deployment 12.4.0
- Cloud Foundry cf-deployment 12.5.0
- FasterXML jackson-databind 2.0.0
- FasterXML jackson-databind 2.3
- FasterXML jackson-databind 2.4
- FasterXML jackson-databind 2.5
- FasterXML jackson-databind 2.6
- FasterXML jackson-databind 2.6.7.1
- FasterXML jackson-databind 2.7
- FasterXML jackson-databind 2.7.9.1
- FasterXML jackson-databind 2.7.9.3
- FasterXML jackson-databind 2.7.9.4
- FasterXML jackson-databind 2.8
- FasterXML jackson-databind 2.8.10
- FasterXML jackson-databind 2.8.11
- FasterXML jackson-databind 2.8.11.1
- FasterXML jackson-databind 2.8.11.2
- FasterXML jackson-databind 2.8.7
- FasterXML jackson-databind 2.8.8
- FasterXML jackson-databind 2.8.8.1
- FasterXML jackson-databind 2.8.9
- FasterXML jackson-databind 2.9.0
- FasterXML jackson-databind 2.9.1
- FasterXML jackson-databind 2.9.10
- FasterXML jackson-databind 2.9.2
- FasterXML jackson-databind 2.9.3
- FasterXML jackson-databind 2.9.4
- FasterXML jackson-databind 2.9.5
- FasterXML jackson-databind 2.9.6
- FasterXML jackson-databind 2.9.7
- FasterXML jackson-databind 2.9.8
- FasterXML jackson-databind 2.9.9
- IBM Cúram Social Program Management 7.0.0.0
- IBM Cúram Social Program Management 7.0.0.1
- IBM Cúram Social Program Management 7.0.0.2
- IBM Cúram Social Program Management 7.0.1.0
- IBM Cúram Social Program Management 7.0.1.1
- IBM Cúram Social Program Management 7.0.1.3
- IBM Cúram Social Program Management 7.0.2.0
- IBM Cúram Social Program Management 7.0.3.0
- IBM Cúram Social Program Management 7.0.4.0
- IBM Cúram Social Program Management 7.0.4.4
- IBM Cúram Social Program Management 7.0.5.0
- IBM Cúram Social Program Management 7.0.8.0
- NetApp OnCommand Workflow Automation
- NetApp SnapCenter
- Redhat Descision Manager 7
- Redhat Enterprise Linux 8
- Redhat JBoss A-MQ 6.0
- Redhat JBoss Enterprise Application Platform 7.0
- Redhat JBoss Fuse 6.0
- Redhat JBoss Fuse 7.0
- Redhat Mobile Application Platform 4
- Redhat OpenShift Container Platform 3.11
- Redhat OpenShift Container Platform 4.1
- Redhat OpenShift Container Platform 4.2
- Redhat Openshift Application Runtimes
- Redhat Process Automation 7
- Redhat Single Sign-On 7.0
- Redhat Software Collections for RHEL 7
- Redhat Software Collections for RHEL 7.5 EUS
- Redhat Software Collections for RHEL 7.6 EUS
- Redhat Software Collections for RHEL 7.7 EUS
Recommendations
Block external access at the network boundary, unless external parties require service.
If possible, block access to the server at the network perimeter. Allow only trusted computers and networks to have access to the resources.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor the network for suspicious requests. This may help detect attacks that try to exploit These and similar vulnerabilities. Audit all applicable logs regularly.
Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of a successful exploit, run the hosting webserver in a chrooted or jailed environment with the minimal amount of privileges required for functionality.
Implement multiple redundant layers of security.
Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker’s ability to exploit this vulnerability to execute arbitrary code.
Updates are available. Please see the references or vendor advisory for more information.