Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Block one more gadget type (logback, CVE-2019-12384) #2334

Closed
cowtowncoder opened this issue May 28, 2019 · 10 comments
Closed

Block one more gadget type (logback, CVE-2019-12384) #2334

cowtowncoder opened this issue May 28, 2019 · 10 comments
Labels
CVE Issues related to public CVEs (security vuln reports)
Milestone

Comments

@cowtowncoder
Copy link
Member

cowtowncoder commented May 28, 2019

A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was CVE-2019-12384.
CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12384 for full details, but the specific variation (in addition to needing "default typing", attacker being able to craft specific json message) is that:

  • If service has jar logback-classic in its classpath

vulnerability applies.


Fixed in:

  • 2.9.10
  • 2.8.11.4
  • 2.7.9.6
  • 2.6.7.3
@cowtowncoder cowtowncoder added 2.9 CVE Issues related to public CVEs (security vuln reports) labels May 28, 2019
@hwwxj
Copy link

hwwxj commented Jun 11, 2019

Excuse me, may I ask when will this issue be solved?

@cowtowncoder
Copy link
Member Author

I hope to have to work on this (and perhaps the other CVE to file) later this week.

@cowtowncoder cowtowncoder added this to the 2.9.9.1 milestone Jun 13, 2019
@cowtowncoder
Copy link
Member Author

Fixed in 2.9 (for likely micro-patch 2.9.9.1), as well as backported in 2.8 and 2.7 (in case new versions might be released; or to make it easier for users to build from those branches).

@hwwxj
Copy link

hwwxj commented Jun 17, 2019

ok, thank you very much. By the way, when will the patch 2.9.9.1 be released? we need this urgently.

@cowtowncoder
Copy link
Member Author

I'll be going on vacation later today, back on July 1st, so at earliest in early July (but possibly mid-July, depending on if it'll be 2.9.10 or 2.9.9.1).

@cowtowncoder
Copy link
Member Author

Release 2.9.9.1 in-progress.

@jebeaudet
Copy link

@cowtowncoder Are you planning on releasing a 2.9.9.1 for the jackson-bom artifact containing this jackson-databind release? Thanks

scottfrederick pushed a commit to spring-cloud/spring-cloud-connectors that referenced this issue Jul 5, 2019
@cowtowncoder
Copy link
Member Author

@jebeaudet I am bit on fence on that -- if you would find it useful, please file an issue and I can create one?

@hwwxj
Copy link

hwwxj commented Aug 5, 2019

Excuse me, may I ask when will jackson 2.9.10 be released?

@cowtowncoder
Copy link
Member Author

@hwwxj Not clear yet -- not enough bug fixes to warrant full release. But micro-patches 2.9.9.1 and 2.9.9.2 exist with the fix (plus there will be imminent 2.9.9.3 to address #2395 that was included in 2.9.9.2).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
CVE Issues related to public CVEs (security vuln reports)
Projects
None yet
Development

No branches or pull requests

3 participants