Fix for Jackson Data-bind Vulnerability
|Release Date||May 24, 2019|
We’ve updated the Jackson Data-bind library in our Java SDKs due to a vulnerability reported recently. Please generate a new Java SDK from APIMatic to get the fix.
The following vulnerability, detailed in CVE-2019-12086, was reported in the version
2.9.8 of the library that we were using:
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
com.fasterxml.jackson.core:jackson-databind needs to be updated to version
2.9.9 or later. For example:
<dependency> <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> <version>[2.9.9,)</version> </dependency>
You can generate a new Java SDK from APIMatic to receive this fix.
Have questions? Submit a request.