Vulnerability Details : CVE-2022-42004
Potential exploit
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
Products affected by CVE-2022-42004
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
- cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
- cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
- cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-42004
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 45 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-42004
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
Oracle:CPUOct2023 |
CWE ids for CVE-2022-42004
-
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-42004
-
https://security.netapp.com/advisory/ntap-20221118-0008/
CVE-2022-42004 FasterXML Jackson Databind Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88
Fix #3582 · FasterXML/jackson-databind@0631835 · GitHubPatch;Third Party Advisory
-
https://github.com/FasterXML/jackson-databind/issues/3582
Add check in `BeanDeserializer._deserializeFromArray()` to prevent use of deeply nested arrays · Issue #3582 · FasterXML/jackson-databind · GitHubExploit;Issue Tracking;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5283
Debian -- Security Information -- DSA-5283-1 jackson-databindThird Party Advisory
-
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490
50490 - jackson-databind:ObjectReader2Fuzzer: Security exception in com.fasterxml.jackson.databind.deser.BeanDeserializer._deserializeFromArray - oss-fuzzExploit;Issue Tracking;Mailing List;Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html
[SECURITY] [DLA 3207-1] jackson-databind security updateMailing List;Third Party Advisory
-
https://security.gentoo.org/glsa/202210-21
FasterXML jackson-databind: Multiple vulnerabilities (GLSA 202210-21) — Gentoo securityThird Party Advisory
Jump to