Skip to main content

Fix for Jackson Data-bind Vulnerability

· One min read

We've updated the Jackson Data-bind library in our Java SDKs due to a vulnerability reported recently. Please generate a new Java SDK from APIMatic to get the fix.

Details

The following vulnerability, detailed in CVE-2019-12086, was reported in the version 2.9.8 of the library that we were using:

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.

Remediation

The library com.fasterxml.jackson.core:jackson-databind needs to be updated to version 2.9.9 or later. For example:

<dependency>
<groupId>com.fasterxml.jackson.core</groupId>
<artifactId>jackson-databind</artifactId>
<version>[2.9.9,)</version>
</dependency>

You can generate a new Java SDK from APIMatic to receive this fix.