You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
General data-binding functionality for Jackson: works on core streaming API
Path to dependency file: WebGoat-Legacy/pom.xml
Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.0.4/jackson-databind-2.0.4.jar,WebGoat-Legacy/target/WebGoat-6.0.1/WEB-INF/lib/jackson-databind-2.0.4.jar
Dependency Hierarchy:
❌ jackson-databind-2.0.4.jar (Vulnerable Library)
Found in base branch: master
Vulnerability Details
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
mend-for-github-combot
changed the title
CVE-2019-12086 (Medium) detected in jackson-databind-2.0.4.jar
CVE-2019-12086 (High) detected in jackson-databind-2.0.4.jar
Oct 8, 2020
CVE-2019-12086 - High Severity Vulnerability
Vulnerable Library - jackson-databind-2.0.4.jar
General data-binding functionality for Jackson: works on core streaming API
Path to dependency file: WebGoat-Legacy/pom.xml
Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.0.4/jackson-databind-2.0.4.jar,WebGoat-Legacy/target/WebGoat-6.0.1/WEB-INF/lib/jackson-databind-2.0.4.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
Publish Date: 2019-05-17
URL: CVE-2019-12086
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086
Release Date: 2019-05-17
Fix Resolution: 2.9.9
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: