CVE-2017-7525

CVSS V2 High 7.5 CVSS V3 Critical 9.8
Description
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
Overview
  • CVE ID
  • CVE-2017-7525
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2018-02-06T15:29:00
  • Last Modified Date
  • 2022-04-12T16:17:48
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* 1 OR 2.6.0 2.6.7.1
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* 1 OR 2.7.0 2.7.9.1
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* 1 OR 2.8.0 2.8.9
cpe:2.3:a:fasterxml:jackson-databind:2.9.0:prerelease1:*:*:*:*:*:* 1 OR
cpe:2.3:a:fasterxml:jackson-databind:2.9.0:prerelease2:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:linux:*:* 1 OR
cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:* 1 OR
cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_communications_policy_management:*:*:*:*:*:*:*:* 1 OR 12.0 12.5.2
cpe:2.3:a:oracle:communications_diameter_signaling_route:*:*:*:*:*:*:*:* 1 OR 8.3
cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.4.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.5.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.6.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:global_lifecycle_management_opatchauto:*:*:*:*:*:*:*:* 1 OR 12.2.0.1.14
cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:* 1 OR 17.1 17.12
cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:utilities_advanced_spatial_and_operational_analytics:2.7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://github.com/FasterXML/jackson-databind/issues/1599 Issue Tracking Patch Third Party Advisory
https://github.com/FasterXML/jackson-databind/issues/1723 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1462702 Issue Tracking Third Party Advisory
https://www.debian.org/security/2017/dsa-4004 Third Party Advisory
https://security.netapp.com/advisory/ntap-20171214-0002/ Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3458 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3456 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3455 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3454 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3141 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2638 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2637 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2636 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2635 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2547 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2546 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2477 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1840 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1839 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1837 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1836 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1835 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1834 Third Party Advisory
http://www.securitytracker.com/id/1039947 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039744 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/99623 Third Party Advisory VDB Entry
https://cwiki.apache.org/confluence/display/WW/S2-055 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0294 Third Party Advisory
http://www.securitytracker.com/id/1040360 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0342 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1450 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1449 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html Patch Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E Mailing List Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0910 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2858 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3149 Third Party Advisory
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399@%3Csolr-user.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87@%3Csolr-user.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Third Party Advisory
https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c@%3Ccommits.cassandra.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3E Mailing List Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 15:43:29 Added to TrackCVE
2022-12-03 01:47:19 2018-02-06T15:29Z 2018-02-06T15:29:00 CVE Published Date updated
2022-12-03 01:47:19 2022-04-12T16:17:48 CVE Modified Date updated
2022-12-03 01:47:19 Analyzed Vulnerability Status updated