CVE-2018-12022:
jackson-databind Deserialization of Untrusted Data vulnerability
7.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
3/25/2019
Updated
3/1/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.fasterxml.jackson.core:jackson-databind | maven | >= 2.9.0, < 2.9.6 | 2.9.6 |
com.fasterxml.jackson.core:jackson-databind | maven | <= 2.7.9.3 | 2.7.9.4 |
com.fasterxml.jackson.core:jackson-databind | maven | >= 2.8.0, <= 2.8.11.1 | 2.8.11.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The patches and descriptions provided indicate that the vulnerability is related to the deserialization of untrusted data in jackson-databind, specifically involving the Jodd-db library. The SubTypeValidator class is modified to block certain classes, suggesting its involvement in the vulnerability. The method validateSubType is likely a key point of interest for runtime detection.