https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Bug ID: 1821311 Summary: CVE-2020-11112 jackson-databind: jackson-databind: mishandles the interaction between serialization gadgets and typing related to org.apache.commons.proxy.provider.remoting.RmiProvider which could result in remote command execution Product: Security Response Hardware: All OS: Linux Status: NEW Component: vulnerability Keywords: Security Severity: medium Priority: medium Assignee: security-response-team@redhat.com Reporter: mkaplan@redhat.com CC: aboyko@redhat.com, aileenc@redhat.com, akoufoud@redhat.com, alazarot@redhat.com, almorale@redhat.com, anstephe@redhat.com, aos-bugs@redhat.com, asoldano@redhat.com, atangrin@redhat.com, ataylor@redhat.com, avibelli@redhat.com, bbaranow@redhat.com, bbuckingham@redhat.com, bcourt@redhat.com, bgeorges@redhat.com, bkearney@redhat.com, bmaxwell@redhat.com, bmontgom@redhat.com, brian.stansberry@redhat.com, btotty@redhat.com, cdewolf@redhat.com, chazlett@redhat.com, darran.lofthouse@redhat.com, dbecker@redhat.com, decathorpe@gmail.com, dkreling@redhat.com, dosoudil@redhat.com, drieden@redhat.com, eparis@redhat.com, etirelli@redhat.com, ganandan@redhat.com, ggaughan@redhat.com, gmalinko@redhat.com, hhudgeon@redhat.com, ibek@redhat.com, iweiss@redhat.com, janstey@redhat.com, java-sig-commits@lists.fedoraproject.org, jawilson@redhat.com, jbalunas@redhat.com, jburrell@redhat.com, jcantril@redhat.com, jjoyce@redhat.com, jochrist@redhat.com, jokerman@redhat.com, jolee@redhat.com, jpallich@redhat.com, jperkins@redhat.com, jschatte@redhat.com, jschluet@redhat.com, jstastny@redhat.com, jwon@redhat.com, kbasil@redhat.com, krathod@redhat.com, kverlaen@redhat.com, kwills@redhat.com, lef@fedoraproject.org, lgao@redhat.com, lhh@redhat.com, lpeer@redhat.com, lthon@redhat.com, lzap@redhat.com, mburns@redhat.com, mkolesni@redhat.com, mmccune@redhat.com, mnovotny@redhat.com, msochure@redhat.com, msvehla@redhat.com, mszynkie@redhat.com, nmoumoul@redhat.com, nstielau@redhat.com, nwallace@redhat.com, paradhya@redhat.com, pdrozd@redhat.com, pgallagh@redhat.com, pjindal@redhat.com, pmackay@redhat.com, psotirop@redhat.com, puntogil@libero.it, rchan@redhat.com, rguimara@redhat.com, rhcs-maint@redhat.com, rjerrido@redhat.com, rrajasek@redhat.com, rruss@redhat.com, rstancel@redhat.com, rsvoboda@redhat.com, rsynek@redhat.com, sclewis@redhat.com, scohen@redhat.com, sdaley@redhat.com, slinaber@redhat.com, smaestri@redhat.com, sokeeffe@redhat.com, sponnaga@redhat.com, stewardship-sig@lists.fedoraproject.org, sthorger@redhat.com, swoodman@redhat.com, tbrisker@redhat.com, tom.jenkinson@redhat.com, vhalbert@redhat.com Target Milestone: --- Classification: Other
A vulnerability was found in Jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #1 from Michael Kaplan mkaplan@redhat.com --- External References:
https://github.com/FasterXML/jackson-databind/issues/2666
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Michael Kaplan mkaplan@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1821312
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1821312 [Bug 1821312] CVE-2020-11112 jackson-databind: jackson-databind: mishandles the interaction between serialization gadgets and typing related to org.apache.commons.proxy.provider.remoting.RmiProvider which could result in remote command execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #2 from Michael Kaplan mkaplan@redhat.com --- Created jackson-databind tracking bugs for this issue:
Affects: fedora-all [bug 1821312]
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Michael Kaplan mkaplan@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Summary|CVE-2020-11112 |CVE-2020-11112 |jackson-databind: |jackson-databind: |jackson-databind: |jackson-databind: |mishandles the interaction |mishandles the interaction |between serialization |between serialization |gadgets and typing related |gadgets and typing related |to |to |org.apache.commons.proxy.pr |org.apache.commons.proxy.pr |ovider.remoting.RmiProvider |ovider.remoting.RmiProvider | which could result in |which could result in |remote command execution |remote command execution
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Michael Kaplan mkaplan@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1821317
https://bugzilla.redhat.com/show_bug.cgi?id=1821311 Bug 1821311 depends on bug 1821312, which changed state.
Bug 1821312 Summary: CVE-2020-11112 jackson-databind: jackson-databind: mishandles the interaction between serialization gadgets and typing related to org.apache.commons.proxy.provider.remoting.RmiProvider which could result in remote command execution [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1821312
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |CURRENTRELEASE
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #3 from Yadnyawalk Tale ytale@redhat.com --- Statement:
Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #4 from Riccardo Schirone rschiron@redhat.com --- Upstream fix: https://github.com/FasterXML/jackson-databind/commit/05d7e0e13f43e12db6a5172...
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #5 from Anten Skrabec askrabec@redhat.com --- Statement:
Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.
Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #6 from Jason Shepherd jshepherd@redhat.com --- Statement:
Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.
Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.
While OpenShift Container Platform's elasticsearch plugins do ship the vulnerable component, it doesn't do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Riccardo Schirone rschiron@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Priority|medium |high Severity|medium |high
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #7 from Riccardo Schirone rschiron@redhat.com --- Mitigation:
Mitigation:
The following conditions are needed for an exploit, we recommend avoiding all if possible * Deserialization from sources you do not control * `enableDefaultTyping()` * `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Riccardo Schirone rschiron@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1822931, 1822932, 1822930, | |1822933
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #10 from Riccardo Schirone rschiron@redhat.com --- Mitigation:
The following conditions are needed for an exploit, we recommend avoiding all if possible * Deserialization from sources you do not control * `enableDefaultTyping()` * `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Jason Shepherd jshepherd@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1823564, 1823562, 1823563
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Jason Shepherd jshepherd@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1823565
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Jason Shepherd jshepherd@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On|1823563 |
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Jason Shepherd jshepherd@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On|1823563 | Depends On|1823562 |
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Tomas Hoger thoger@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Summary|CVE-2020-11112 |CVE-2020-11112 |jackson-databind: |jackson-databind: |jackson-databind: |Serialization gadgets in |mishandles the interaction |org.apache.commons.proxy.pr |between serialization |ovider.remoting.RmiProvider |gadgets and typing related | |to | |org.apache.commons.proxy.pr | |ovider.remoting.RmiProvider | |which could result in | |remote command execution |
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Riccardo Schirone rschiron@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1825174
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #24 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS
Via RHSA-2020:1523 https://access.redhat.com/errata/RHSA-2020:1523
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:1523
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #25 from Riccardo Schirone rschiron@redhat.com --- Statement:
Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.
Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.
While OpenShift Container Platform's elasticsearch plugins do ship the vulnerable component, it doesn't do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.
The PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
Product Security DevOps Team prodsec-dev@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |ERRATA Last Closed| |2020-04-21 16:32:13
--- Comment #26 from Product Security DevOps Team prodsec-dev@redhat.com --- This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):
https://access.redhat.com/security/cve/cve-2020-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #28 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Openshift Application Runtimes
Via RHSA-2020:2067 https://access.redhat.com/errata/RHSA-2020:2067
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:2067
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #29 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
EAP-CD 19 Tech Preview
Via RHSA-2020:2333 https://access.redhat.com/errata/RHSA-2020:2333
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:2333
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Doc Text *updated* by Eric Christensen sparks@redhat.com --- A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #32 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Fuse 7.7.0
Via RHSA-2020:3192 https://access.redhat.com/errata/RHSA-2020:3192
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:3192
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #33 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Decision Manager
Via RHSA-2020:3196 https://access.redhat.com/errata/RHSA-2020:3196
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:3196
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #34 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Process Automation
Via RHSA-2020:3197 https://access.redhat.com/errata/RHSA-2020:3197
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:3197
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #35 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Data Grid 7.3.7
Via RHSA-2020:3779 https://access.redhat.com/errata/RHSA-2020:3779
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:3779
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
--- Comment #36 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Single Sign-On 7.4.0
Via RHSA-2020:5625 https://access.redhat.com/errata/RHSA-2020:5625
https://bugzilla.redhat.com/show_bug.cgi?id=1821311
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:5625
java-sig-commits@lists.fedoraproject.org