Learn about CVE-2017-17485, a vulnerability in FasterXML jackson-databind allowing unauthenticated remote code execution. Find out the impact, affected systems, exploitation mechanism, and mitigation steps.
Unauthenticated remote code execution is possible in FasterXML jackson-databind versions 2.8.10 and 2.9.x up to 2.9.3 due to an incomplete patch for the CVE-2017-7525 vulnerability. This can be exploited by supplying manipulated JSON input to the readValue function of the ObjectMapper, effectively circumventing a blacklist that proves ineffective in the presence of Spring libraries within the classpath.
Understanding CVE-2017-17485
CVE-2017-17485 is a vulnerability in FasterXML jackson-databind that allows unauthenticated remote code execution.
What is CVE-2017-17485?
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This vulnerability can be exploited by sending maliciously crafted JSON input to the readValue method of the ObjectMapper.
The Impact of CVE-2017-17485
Technical Details of CVE-2017-17485
FasterXML jackson-databind vulnerability details.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Steps to mitigate and prevent CVE-2017-17485.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates