Vulnerability Description
On February 19, National Vulnerability Database (NVD) disclosed a remote code execution vulnerability (CVE-2020-8840) that resulted from JNDI injection in jackson-databind and assigned a CVSS score of 9.8. Affected versions of jackson-databind lack certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. An attacker could exploit this vulnerability to cause remote code execution via JNDI injection. Currently, the vendor has released new versions to fix this vulnerability. Affected users are advised to update their installation to the latest versions as soon as possible.
For details of this vulnerability, visit the following link:
https://nvd.nist.gov/vuln/detail/CVE-2020-8840
Scope of Impact
Affected Versions
- 0.0 <= FasterXML jackson-databind <= 2.9.10.2
Unaffected Versions
- FasterXML jackson-databind = 2.8.11.5
- FasterXML jackson-databind = 2.9.10.3 (to be released)
Vulnerability Detection
-
Version Check
Developers are advised to check whether the jackson-databind component is used in applications, and if so, to further check its version number. The following uses the Maven project as an example to show how to check the use of jackson-databind.
Check whether jackson-databind is included in pom.xml and, if so, check the current version.
If the current version is within the affected scope, the application is potentially at risk.
Mitigation
-
Official Update
Currently, this vulnerability has been fixed in new versions. Affected users are advised to upgrade to the new versions as soon as possible. If no patch is not available for certain versions currently, related users should check the official website from time to time to download the update immediately after it is released:
https://github.com/FasterXML/jackson-databind/releases
Developers can upgrade and compile jackson-databind by configuring Maven as follows:
<!– https://mvnrepository.com/artifact/com.fasterxml.jackson.core/jackson-databind –>
<dependency> <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> <version>2.8.11.5</version> </dependency> |
-
Protection with Security Products
NSFOCUS Web Application Firewall (WAF)’s legacy protection rule (27004899) can protect against this vulnerability. Users should update protection rules on the device as soon as possible for vulnerability protection.
Statement
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
About NSFOCUS
NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.
NSFOCUS works with Fortune Global 500 companies, including four of the world’s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).
A wholly owned subsidiary of NSFOCUS Information Technology Co. Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.