📂 Vulnerable Library - legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
Findings
| Finding |
Severity |
🎯 CVSS |
Exploit Maturity |
EPSS |
Library |
Type |
Fixed in |
Remediation Available |
Reachability |
| CVE-842749-413332 |
🟣 Critical |
9.8 |
N/A |
N/A |
commons-lang-2.6.jar |
Direct |
N/A |
❌ |
|
| CVE-2020-36518 |
🔴 High |
8.7 |
Not Defined |
< 1% |
jackson-databind-2.10.5.1.jar |
Transitive |
N/A |
❌ |
|
| CVE-2021-46877 |
🔴 High |
8.7 |
Not Defined |
< 1% |
jackson-databind-2.10.5.1.jar |
Transitive |
N/A |
❌ |
|
| CVE-2022-42003 |
🔴 High |
8.7 |
Not Defined |
< 1% |
jackson-databind-2.10.5.1.jar |
Transitive |
N/A |
❌ |
|
| CVE-2022-42004 |
🔴 High |
8.7 |
Not Defined |
< 1% |
jackson-databind-2.10.5.1.jar |
Transitive |
N/A |
❌ |
|
| CVE-2025-52999 |
🔴 High |
8.7 |
Not Defined |
< 1% |
jackson-core-2.10.5.jar |
Transitive |
N/A |
❌ |
|
| CVE-2025-48924 |
🟠 Medium |
6.9 |
Not Defined |
< 1% |
commons-lang-2.6.jar |
Direct |
N/A |
❌ |
|
| CVE-2025-48924 |
🟠 Medium |
6.9 |
Not Defined |
< 1% |
commons-lang3-3.7.jar |
Direct |
N/A |
❌ |
|
| WS-2021-0616 |
🟠 Medium |
5.9 |
N/A |
N/A |
jackson-databind-2.10.5.1.jar |
Transitive |
N/A |
❌ |
|
| CVE-2025-49128 |
🟠 Medium |
5.1 |
Not Defined |
< 1% |
jackson-core-2.10.5.jar |
Transitive |
N/A |
❌ |
|
Details
🟣CVE-842749-413332
Vulnerable Library - commons-lang-2.6.jar
Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: http://www.apache.org/
Path to dependency file: /legend-depot-artifacts-repository-api/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-lang/commons-lang/2.6/commons-lang-2.6.jar
Dependency Hierarchy:
-
❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-artifacts-repository-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-shared-pac4j-0.23.3.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-842749-413332
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2020-36518
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-protocol-pure-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
Vulnerability Details
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects. After conducting further research, Mend has determined that all versions of com.fasterxml.jackson.core:jackson-databind up to version 2.13.2 are vulnerable to CVE-2020-36518.
Mend Note:
Publish Date: Mar 11, 2022 12:00 AM
URL: CVE-2020-36518
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-57j2-w4cx-62h2
Release Date: Mar 11, 2022 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.13.2.1,com.fasterxml.jackson.core:jackson-databind:2.12.6.1
🔴CVE-2021-46877
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-protocol-pure-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
Vulnerability Details
jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.
Mend Note:
Publish Date: Mar 18, 2023 12:00 AM
URL: CVE-2021-46877
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-3x8x-79m2-3w2w
Release Date: Mar 18, 2023 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.6,com.fasterxml.jackson.core:jackson-databind:2.13.1
🔴CVE-2022-42003
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-protocol-pure-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
Vulnerability Details
In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
Mend Note:
Publish Date: Oct 02, 2022 12:00 AM
URL: CVE-2022-42003
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-jjjh-jjxp-wpff
Release Date: Oct 02, 2022 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.13.4.2,com.fasterxml.jackson.core:jackson-databind:2.12.7.1
🔴CVE-2022-42004
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-protocol-pure-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
Vulnerability Details
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
Mend Note:
Publish Date: Oct 02, 2022 12:00 AM
URL: CVE-2022-42004
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-rgv9-q543-rqg4
Release Date: Oct 02, 2022 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.7.1,com.fasterxml.jackson.core:jackson-databind:2.13.4
🔴CVE-2025-52999
Vulnerable Library - jackson-core-2.10.5.jar
Core Jackson processing abstractions (aka Streaming API), implementation for JSON
Library home page: http://fasterxml.com/
Path to dependency file: /legend-depot-core-authorisation/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.10.5/jackson-core-2.10.5.jar
Dependency Hierarchy:
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- jackson-databind-2.10.5.1.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-engine-protocol-pure-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
Vulnerability Details
Impact With older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. Patches jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in FasterXML/jackson-core#943. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. Workarounds Users should avoid parsing input files from untrusted sources.
Publish Date: Jun 27, 2025 05:00 PM
URL: CVE-2025-52999
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2025-48924
Vulnerable Library - commons-lang-2.6.jar
Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: http://www.apache.org/
Path to dependency file: /legend-depot-artifacts-repository-api/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-lang/commons-lang/2.6/commons-lang-2.6.jar
Dependency Hierarchy:
-
❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-artifacts-repository-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-shared-pac4j-0.23.3.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- ❌ commons-lang-2.6.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang-2.6.jar (Vulnerable Library)
Vulnerability Details
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Publish Date: Jul 12, 2025 04:01 AM
URL: CVE-2025-48924
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2025-48924
Vulnerable Library - commons-lang3-3.7.jar
Apache Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: https://www.apache.org/
Path to dependency file: /legend-depot-core-authorisation/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar
Dependency Hierarchy:
-
❌ commons-lang3-3.7.jar (Vulnerable Library)
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- ❌ commons-lang3-3.7.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang3-3.7.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- ❌ commons-lang3-3.7.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- ❌ commons-lang3-3.7.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- ❌ commons-lang3-3.7.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- ❌ commons-lang3-3.7.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- ❌ commons-lang3-3.7.jar (Vulnerable Library)
Vulnerability Details
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Publish Date: Jul 12, 2025 04:01 AM
URL: CVE-2025-48924
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠WS-2021-0616
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-protocol-pure-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-databind-2.10.5.1.jar (Vulnerable Library)
Vulnerability Details
FasterXML jackson-databind before 2.12.6 and 2.13.1 there is DoS when using JDK serialization to serialize JsonNode.
Publish Date: Nov 20, 2021 12:00 AM
URL: WS-2021-0616
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 5.9
Suggested Fix
Type: Upgrade version
Origin: FasterXML/jackson-databind#3328
Release Date: Nov 20, 2021 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.6, 2.13.1; com.fasterxml.jackson.core:jackson-core:2.12.6, 2.13.1
🟠CVE-2025-49128
Vulnerable Library - jackson-core-2.10.5.jar
Core Jackson processing abstractions (aka Streaming API), implementation for JSON
Library home page: http://fasterxml.com/
Path to dependency file: /legend-depot-core-authorisation/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.10.5/jackson-core-2.10.5.jar
Dependency Hierarchy:
-
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- jackson-databind-2.10.5.1.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-engine-protocol-pure-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-shared-core-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
- legend-depot-model-1.7.6-SNAPSHOT.jar
- legend-engine-protocol-pure-4.4.5.jar
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
-
legend-engine-shared-core-4.4.5.jar (Root Library)
- legend-engine-protocol-4.4.5.jar
- ❌ jackson-core-2.10.5.jar (Vulnerable Library)
Vulnerability Details
Overview A flaw in Jackson-core's "JsonLocation._appendSourceDesc" method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. Details The vulnerability affects the creation of exception messages like: JsonParseException: Unexpected character ... at [Source: (byte[])...] When "JsonFactory.createParser(byte[] data, int offset, int len)" is used, and an error occurs while parsing, the exception message should include a snippet from the specified logical payload. However, the method "_appendSourceDesc" ignores the "offset", and always starts reading from index "0". If the buffer contains residual sensitive data from a previous request, such as credentials or document contents, that data may be exposed if the exception is propagated to the client. The issue particularly impacts server applications using: * Pooled byte buffers (e.g., Netty) * Frameworks that surface parse errors in HTTP responses * Default Jackson settings (i.e., "INCLUDE_SOURCE_IN_LOCATION" is enabled) A documented real-world example is "CVE-2021-22145" (https://nvd.nist.gov/vuln/detail/CVE-2021-22145) in Elasticsearch, which stemmed from the same root cause. Attack Scenario An attacker sends malformed JSON to a service using Jackson and pooled byte buffers (e.g., Netty-based HTTP servers). If the server reuses a buffer and includes the parser’s exception in its HTTP 400 response, the attacker may receive residual data from previous requests. Proof of Concept byte[] buffer = new byte[1000]; System.arraycopy("SECRET".getBytes(), 0, buffer, 0, 6); System.arraycopy("{ "bad": }".getBytes(), 0, buffer, 700, 10); JsonFactory factory = new JsonFactory(); JsonParser parser = factory.createParser(buffer, 700, 20); parser.nextToken(); // throws exception // Exception message will include "SECRET" Patches This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via "PR #652" (FasterXML/jackson-core#652). All users should upgrade to version 2.13.0 or later. Workarounds If upgrading is not immediately possible, applications can mitigate the issue by: 1. Disabling exception message exposure to clients — avoid returning parsing exception messages in HTTP responses. 2. Disabling source inclusion in exceptions by setting: jsonFactory.disable(JsonFactory.Feature.INCLUDE_SOURCE_IN_LOCATION); This prevents Jackson from embedding any source content in exception messages, avoiding leakage. References * "Pull Request #652 (Fix implementation)" (FasterXML/jackson-core#652) * "CVE-2021-22145 (Elasticsearch exposure of this flaw)" (https://nvd.nist.gov/vuln/detail/CVE-2021-22145)
Publish Date: Jun 12, 2025 12:59 AM
URL: CVE-2025-49128
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 5.1
Suggested Fix
Type: Upgrade version
Origin: GHSA-wf8f-6423-gfxg
Release Date: Jun 12, 2025 12:59 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-core:2.13.0
📂 Vulnerable Library - legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
Findings
Details
🟣CVE-842749-413332
Vulnerable Library - commons-lang-2.6.jar
Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: http://www.apache.org/
Path to dependency file: /legend-depot-artifacts-repository-api/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-lang/commons-lang/2.6/commons-lang-2.6.jar
Dependency Hierarchy:
❌ commons-lang-2.6.jar (Vulnerable Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-repository-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
Vulnerability Details
Created automatically by the test suite
Publish Date: Jun 07, 2010 05:12 PM
URL: CVE-842749-413332
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 9.8
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2020-36518
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-protocol-pure-4.4.5.jar (Root Library)
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects. After conducting further research, Mend has determined that all versions of com.fasterxml.jackson.core:jackson-databind up to version 2.13.2 are vulnerable to CVE-2020-36518.
Mend Note:
Publish Date: Mar 11, 2022 12:00 AM
URL: CVE-2020-36518
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-57j2-w4cx-62h2
Release Date: Mar 11, 2022 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.13.2.1,com.fasterxml.jackson.core:jackson-databind:2.12.6.1
🔴CVE-2021-46877
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-protocol-pure-4.4.5.jar (Root Library)
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.
Mend Note:
Publish Date: Mar 18, 2023 12:00 AM
URL: CVE-2021-46877
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-3x8x-79m2-3w2w
Release Date: Mar 18, 2023 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.6,com.fasterxml.jackson.core:jackson-databind:2.13.1
🔴CVE-2022-42003
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-protocol-pure-4.4.5.jar (Root Library)
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
Mend Note:
Publish Date: Oct 02, 2022 12:00 AM
URL: CVE-2022-42003
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-jjjh-jjxp-wpff
Release Date: Oct 02, 2022 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.13.4.2,com.fasterxml.jackson.core:jackson-databind:2.12.7.1
🔴CVE-2022-42004
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-protocol-pure-4.4.5.jar (Root Library)
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
Mend Note:
Publish Date: Oct 02, 2022 12:00 AM
URL: CVE-2022-42004
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-rgv9-q543-rqg4
Release Date: Oct 02, 2022 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.7.1,com.fasterxml.jackson.core:jackson-databind:2.13.4
🔴CVE-2025-52999
Vulnerable Library - jackson-core-2.10.5.jar
Core Jackson processing abstractions (aka Streaming API), implementation for JSON
Library home page: http://fasterxml.com/
Path to dependency file: /legend-depot-core-authorisation/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.10.5/jackson-core-2.10.5.jar
Dependency Hierarchy:
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-protocol-pure-4.4.5.jar (Root Library)
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
Impact With older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. Patches jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in FasterXML/jackson-core#943. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. Workarounds Users should avoid parsing input files from untrusted sources.
Publish Date: Jun 27, 2025 05:00 PM
URL: CVE-2025-52999
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2025-48924
Vulnerable Library - commons-lang-2.6.jar
Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: http://www.apache.org/
Path to dependency file: /legend-depot-artifacts-repository-api/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-lang/commons-lang/2.6/commons-lang-2.6.jar
Dependency Hierarchy:
❌ commons-lang-2.6.jar (Vulnerable Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-repository-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
Vulnerability Details
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Publish Date: Jul 12, 2025 04:01 AM
URL: CVE-2025-48924
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠CVE-2025-48924
Vulnerable Library - commons-lang3-3.7.jar
Apache Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.
Library home page: https://www.apache.org/
Path to dependency file: /legend-depot-core-authorisation/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar
Dependency Hierarchy:
❌ commons-lang3-3.7.jar (Vulnerable Library)
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Publish Date: Jul 12, 2025 04:01 AM
URL: CVE-2025-48924
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🟠WS-2021-0616
Vulnerable Library - jackson-databind-2.10.5.1.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /legend-depot-core-http/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar
Dependency Hierarchy:
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-protocol-pure-4.4.5.jar (Root Library)
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
FasterXML jackson-databind before 2.12.6 and 2.13.1 there is DoS when using JDK serialization to serialize JsonNode.
Publish Date: Nov 20, 2021 12:00 AM
URL: WS-2021-0616
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 5.9
Suggested Fix
Type: Upgrade version
Origin: FasterXML/jackson-databind#3328
Release Date: Nov 20, 2021 12:00 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.6, 2.13.1; com.fasterxml.jackson.core:jackson-core:2.12.6, 2.13.1
🟠CVE-2025-49128
Vulnerable Library - jackson-core-2.10.5.jar
Core Jackson processing abstractions (aka Streaming API), implementation for JSON
Library home page: http://fasterxml.com/
Path to dependency file: /legend-depot-core-authorisation/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.10.5/jackson-core-2.10.5.jar
Dependency Hierarchy:
legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-protocol-pure-4.4.5.jar (Root Library)
legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)
legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)
legend-engine-shared-core-4.4.5.jar (Root Library)
Vulnerability Details
Overview A flaw in Jackson-core's "JsonLocation._appendSourceDesc" method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. Details The vulnerability affects the creation of exception messages like: JsonParseException: Unexpected character ... at [Source: (byte[])...] When "JsonFactory.createParser(byte[] data, int offset, int len)" is used, and an error occurs while parsing, the exception message should include a snippet from the specified logical payload. However, the method "_appendSourceDesc" ignores the "offset", and always starts reading from index "0". If the buffer contains residual sensitive data from a previous request, such as credentials or document contents, that data may be exposed if the exception is propagated to the client. The issue particularly impacts server applications using: * Pooled byte buffers (e.g., Netty) * Frameworks that surface parse errors in HTTP responses * Default Jackson settings (i.e., "INCLUDE_SOURCE_IN_LOCATION" is enabled) A documented real-world example is "CVE-2021-22145" (https://nvd.nist.gov/vuln/detail/CVE-2021-22145) in Elasticsearch, which stemmed from the same root cause. Attack Scenario An attacker sends malformed JSON to a service using Jackson and pooled byte buffers (e.g., Netty-based HTTP servers). If the server reuses a buffer and includes the parser’s exception in its HTTP 400 response, the attacker may receive residual data from previous requests. Proof of Concept byte[] buffer = new byte[1000]; System.arraycopy("SECRET".getBytes(), 0, buffer, 0, 6); System.arraycopy("{ "bad": }".getBytes(), 0, buffer, 700, 10); JsonFactory factory = new JsonFactory(); JsonParser parser = factory.createParser(buffer, 700, 20); parser.nextToken(); // throws exception // Exception message will include "SECRET" Patches This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via "PR #652" (FasterXML/jackson-core#652). All users should upgrade to version 2.13.0 or later. Workarounds If upgrading is not immediately possible, applications can mitigate the issue by: 1. Disabling exception message exposure to clients — avoid returning parsing exception messages in HTTP responses. 2. Disabling source inclusion in exceptions by setting: jsonFactory.disable(JsonFactory.Feature.INCLUDE_SOURCE_IN_LOCATION); This prevents Jackson from embedding any source content in exception messages, avoiding leakage. References * "Pull Request #652 (Fix implementation)" (FasterXML/jackson-core#652) * "CVE-2021-22145 (Elasticsearch exposure of this flaw)" (https://nvd.nist.gov/vuln/detail/CVE-2021-22145)
Publish Date: Jun 12, 2025 12:59 AM
URL: CVE-2025-49128
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 5.1
Suggested Fix
Type: Upgrade version
Origin: GHSA-wf8f-6423-gfxg
Release Date: Jun 12, 2025 12:59 AM
Fix Resolution : com.fasterxml.jackson.core:jackson-core:2.13.0