-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Block yet another gadget type (jdom, CVE-2019-12814) #2341
Comments
Fixed in 2.7, 2.8, 2.9, 2.10 and |
When can we expect a |
I appreciate the hard work being done by the jackson-databind developers, but 3 days later, I have to repeat @antalindisguise's question again: Why isn't |
@volkert-fastned if it helps, you've had a legitimate security issue for ages already, you just didn't know about it until today. Plus, if you don't have JDOM then it would be a legitimate suppression, |
@OrangeDog Thanks. I read it in the CVE description as well. So when the following commands return no results, the project should be unaffected, correct?
|
Well you would also have to "enableDefaultTyping" (either globally or for a specific property :) |
For me, the problem is that our pipeline checks for dependencies with known issues and abort the process if a problem is found. You can argue that the problem is in the previous versions, but if the problem is solved why not just release? |
@mpbalmeida in general you cannot expect every dependency to release a fix as soon as a vulnerability is known. If your pipeline relies on that, then you need to make changes. |
What's on the classpath when your code runs is not simply the list of project dependencies. You need to audit your systems and be aware of what's happening. |
We can manually trigger to rebuild, but I thought the problem was already solved because there were no open issues in 2.9.9.1 milestone |
I don't know the details of how this issue was discovered or originally disclosed (insert grain of salt) |
In the specific case of CVE-2019-12814, one of the prerequisites for being vulnerable (kind of a weird way to put it, but you know what I mean) is "the service has JDOM 1.x or 2.x jar in the classpath". Source: https://nvd.nist.gov/vuln/detail/CVE-2019-12814 |
By the way, it's kind of odd how an XML dependency such as JDOM would trigger a JSON-related vulnerability. |
It is worth noting that JDOM2 comes as a dependency within the latest version of Spring-Boot-Starter-Parent 2.1.6 If you run the cmd: Really hoping version 2.9.9.1 is released soon, this is causing me head aches. |
Really??? I thought Thanks for sharing this method, @andr3w-hilton. And again, not to be ungrateful to the developers, but what's holding up the 2.9.9.1 release right now? Is it undergoing a final rigorous code audit and/or pentest? Because in that case, I completely understand and support the current holdup. |
@volkert-fastned @cowtowncoder has simply taken a break lol - nothing more nothing less. |
Well, to be fair, everybody deserves a good vacation every now and then. 🙂 But I don't think any PRs are necessary anymore. The actual issues have already been resolved. It's just that we're still waiting for the 2.9.9.1 release that contains these fixes: https://github.com/FasterXML/jackson-databind/milestone/97 By the way, It's somewhat worrisome how such a crucial library like jackson-databind apparently has so few developers maintaining it, that the vacation of one person would block a release with an important security fix. One obviously can't blame any individual developers or maintainers for that. This is a problem that needs to be solved at an organizational level. |
xD Not really, usually all deploys are held monitored and approved by a single person? There's a few maintainers hey, I know Tatu is getting ready for 2.10 and doing the min jdk8 impl, i'm doing the jpms impl, I know a few others are doing a few bits as well. Naw, the way it is now is correct, the single point for final approve and deployment definitely is correct. and yea I think he is allowed a break for as long as needed. Rather wait patiently and get a refreshed mind doing it. There also seems to be people complaining about dropping jdk 6 support (but 2.10 drops jdk 7 support), so I believe there's that consideration for 2.9.10 as well for some security fixes (although the jdk has more holes than any library), so there's a lot going on |
If (hopefully not) the one person who can do that gets hit by a car while on holiday, does that mean that there will never be another release of Jackson? There needs to be multiple people who can do it, both to deal with that situation, and with this one. |
It does. @andr3w-hilton is mistaken and looking at the |
Similar to other polymorphic types with no limits, but for XXE with
jdom2.jar
, tracked asCVE-2019-12814
.See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Fixed in:
The text was updated successfully, but these errors were encountered: