The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of FasterXML jackson-databind: information disclosure via net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup Polymorphic Typing

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup Polymorphic Typing of FasterXML jackson-databind, in order to obtain sensitive information.
Severity of this weakness: 2/4.
Creation date: 14/11/2019.
Références of this bulletin: CVE-2019-17267, DLA-2030-1, VIGILANCE-VUL-30870.

Description of the vulnerability

An attacker can bypass access restrictions to data via net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup Polymorphic Typing of FasterXML jackson-databind, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Request your free trial)

This security announce impacts software or systems such as Debian.

Our Vigil@nce team determined that the severity of this threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer vulnerability announce.

Solutions for this threat

Cloud Foundry UAA: version 74.7.0.
The version 74.7.0 is fixed:
  https://www.cloudfoundry.org/

Debian 8: new jackson-databind packages.
New packages are available:
  Debian 8: jackson-databind 2.4.2-2+deb8u10
Full Vigil@nce bulletin... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a systems vulnerabilities patch. The technology watch team tracks security threats targeting the computer system.