-
Notifications
You must be signed in to change notification settings - Fork 305
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhancement: Upgrade Jackson to 2.12.6 or 2.13.1 #5641
Comments
Hi @robelcik, It appears we haven't received any emails for Jackson vulnerabilities to our security@payara.fish inbox in December, we apologise about that, we actively monitor and aim to investigate all security requests. We are investigating the impact of the vulnerability that you have shared. Thank you, |
Hi @robelcik, The server itself should not be vulnerable as Jackson does not seem to be used to process any arbitrary user input - deployed applications may be affected. I have raised Thank you, |
Thank you, @AlanRoth! |
Hello. |
|
Hi @robelcik, We have upgraded Jackson to 2.12.6, it will be available in the next Community and Enterprise releases. Thank you, |
Thank you, guys! @JamesHillyard: As for now, 2.13.2 is the latest greatest. |
Description
Upgrade Jackson to 2.12.6, as currently used version contains known (possible) DoS vulnerability.
Expected Outcome
Jackson upgraded to the latest 2.12.x
Current Outcome
Currently used Jackson contains a known possible DoS vulnerability:
FasterXML/jackson-databind#3328
https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698
In December, I reported it to security@payara.fish but I have not got any reply.
In February, I added related post to forum.payara.fish but I have not got any reply.
That's why I'm submitting a request here.
Alternatives
Upgrade Jackson to the latest 2.13.x
The text was updated successfully, but these errors were encountered: