oss-sec mailing list archives
CVE-2017-15095: further deserialisation attacks against jackson-databind (follow-up to CVE-2017-7525)
From: Doran Moppert <dmoppert () redhat com>
Date: Thu, 2 Nov 2017 11:51:59 +1030
In July, deserialisation vulnerabilities were disclosed affecting jackson-databind [1], assigned CVE-2017-7525. These were patched upstream by blacklisting vulnerable classes, resulting in release 2.8.9 and the issue was closed. Various downstreams including Red Hat issued a fix at this point. 1: https://github.com/FasterXML/jackson-databind/issues/1599 But blacklists being what they are, a further set of dangerous classes have been added since (all included in release 2.9.1). The further patches reference the original ticket, but given that security releases have already been issued for CVE-2017-7525 based on 2.8.9, we thought it prudent to issue a new CVE ID covering the additional classes: CVE-2017-15095. This issue and CVE-2017-7525 were reported by Liao Xinxi of NSFOCUS. Note that there is a mitigation addressing both of these CVEs described at https://bugzilla.redhat.com/show_bug.cgi?id=1462702#c12 More detail below from [2]: 2: https://bugzilla.redhat.com/show_bug.cgi?id=1506612#c3
Other distributions may have made the same mistake, since the original upstream ticket was closed before additional names were added to the blacklist. Original ticket + patches (CVE-2017-7525): https://github.com/FasterXML/jackson-databind/issues/1599 https://github.com/FasterXML/jackson-databind/commit/60d459ce https://github.com/FasterXML/jackson-databind/commit/3bfbb835 Further tickets and patches to block more dangerous types (I think these are all): https://github.com/FasterXML/jackson-databind/issues/1680 https://github.com/FasterXML/jackson-databind/issues/1723 https://github.com/FasterXML/jackson-databind/issues/1737 https://github.com/FasterXML/jackson-databind/commit/e8f043d1 https://github.com/FasterXML/jackson-databind/commit/ddfddfba This CVE-2017-15095 should be considered to include everything in NO_DESER_CLASS_NAMES as of today: https://github.com/FasterXML/jackson-databind/blob/ 7093008aa2afe8068e120df850189ae072dfa1b2/src/main/java/com/fasterxml/ jackson/databind/deser/BeanDeserializerFactory.java#L43
-- Doran Moppert Red Hat Product Security
Attachment:
_bin
Description:
Current thread:
- CVE-2017-15095: further deserialisation attacks against jackson-databind (follow-up to CVE-2017-7525) Doran Moppert (Nov 01)