{"id":"CVE-2017-7525","details":"A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.","aliases":["GHSA-qxxx-2pp7-5hmx"],"modified":"2026-04-16T01:46:07.444106576Z","published":"2018-02-06T15:29:00.297Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f%40%3Cdev.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b%40%3Ccommits.cassandra.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399%40%3Csolr-user.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346%40%3Cdev.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913%40%3Cdev.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6%40%3Cdev.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87%40%3Csolr-user.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629%40%3Csolr-user.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486%40%3Cdev.lucene.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7%40%3Ccommits.cassandra.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c%40%3Ccommits.cassandra.apache.org%3E"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/99623"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1039744"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1039947"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040360"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1834"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1835"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1836"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1837"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1839"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1840"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2477"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2546"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2547"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2633"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2635"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2636"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2637"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2638"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3141"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3454"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3455"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3456"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3458"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0294"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0342"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1449"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1450"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0910"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2858"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3149"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1462702"},{"type":"ADVISORY","url":"https://cwiki.apache.org/confluence/display/WW/S2-055"},{"type":"ADVISORY","url":"https://github.com/FasterXML/jackson-databind/issues/1599"},{"type":"ADVISORY","url":"https://github.com/FasterXML/jackson-databind/issues/1723"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20171214-0002/"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-4004"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1462702"},{"type":"REPORT","url":"https://github.com/FasterXML/jackson-databind/issues/1599"},{"type":"REPORT","url":"https://github.com/FasterXML/jackson-databind/issues/1723"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/issues/1599"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fasterxml/jackson-databind","events":[{"introduced":"0"},{"fixed":"f7abd682a7b2f8145ecff1c4e205073949f1e623"},{"introduced":"50791cc7856376949287e0be3e96147665ab8f68"},{"fixed":"8419c81fad9c7b884b6a02de7b5f1ce5700cbf32"},{"introduced":"81929fad84189ce59ef82e7a6d0df795eb0c7cdb"},{"fixed":"c45ed8c4cbf6c29317bf4cf562558884fa698eec"}]}],"versions":["jackson-databind-2.6.5","jackson-databind-2.6.6","jackson-databind-2.6.7","jackson-databind-2.7.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-7525.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}