Skip to content

legend-depot-store-metrics-1.7.6-SNAPSHOT.jar: 7 vulnerabilities (highest severity is: 8.7) [master] #42

@mend-developer-platform-dev

Description

@mend-developer-platform-dev
📂 Vulnerable Library - legend-depot-store-metrics-1.7.6-SNAPSHOT.jar

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2020-36518 🔴 High 8.7 Not Defined < 1% jackson-databind-2.10.5.1.jar Transitive N/A
CVE-2021-46877 🔴 High 8.7 Not Defined < 1% jackson-databind-2.10.5.1.jar Transitive N/A
CVE-2022-42003 🔴 High 8.7 Not Defined < 1% jackson-databind-2.10.5.1.jar Transitive N/A
CVE-2022-42004 🔴 High 8.7 Not Defined < 1% jackson-databind-2.10.5.1.jar Transitive N/A
CVE-2025-52999 🔴 High 8.7 Not Defined < 1% jackson-core-2.10.5.jar Transitive N/A
WS-2021-0616 🟠 Medium 5.9 N/A N/A jackson-databind-2.10.5.1.jar Transitive N/A
CVE-2025-49128 🟠 Medium 5.1 Not Defined < 1% jackson-core-2.10.5.jar Transitive N/A

Details

🔴CVE-2020-36518

Vulnerable Library - jackson-databind-2.10.5.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /legend-depot-core-http/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar

Dependency Hierarchy:

  • legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-protocol-pure-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-shared-core-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-protocol-pure-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-shared-core-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)

Vulnerability Details

jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects. After conducting further research, Mend has determined that all versions of com.fasterxml.jackson.core:jackson-databind up to version 2.13.2 are vulnerable to CVE-2020-36518.
Mend Note:

Publish Date: Mar 11, 2022 12:00 AM

URL: CVE-2020-36518

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.7


Suggested Fix

Type: Upgrade version

Origin: GHSA-57j2-w4cx-62h2

Release Date: Mar 11, 2022 12:00 AM

Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.13.2.1,com.fasterxml.jackson.core:jackson-databind:2.12.6.1

🔴CVE-2021-46877

Vulnerable Library - jackson-databind-2.10.5.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /legend-depot-core-http/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar

Dependency Hierarchy:

  • legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-protocol-pure-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-shared-core-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-protocol-pure-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-shared-core-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)

Vulnerability Details

jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.
Mend Note:

Publish Date: Mar 18, 2023 12:00 AM

URL: CVE-2021-46877

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.7


Suggested Fix

Type: Upgrade version

Origin: GHSA-3x8x-79m2-3w2w

Release Date: Mar 18, 2023 12:00 AM

Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.6,com.fasterxml.jackson.core:jackson-databind:2.13.1

🔴CVE-2022-42003

Vulnerable Library - jackson-databind-2.10.5.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /legend-depot-core-http/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar

Dependency Hierarchy:

  • legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-protocol-pure-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-shared-core-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-protocol-pure-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-shared-core-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)

Vulnerability Details

In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
Mend Note:

Publish Date: Oct 02, 2022 12:00 AM

URL: CVE-2022-42003

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.7


Suggested Fix

Type: Upgrade version

Origin: GHSA-jjjh-jjxp-wpff

Release Date: Oct 02, 2022 12:00 AM

Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.13.4.2,com.fasterxml.jackson.core:jackson-databind:2.12.7.1

🔴CVE-2022-42004

Vulnerable Library - jackson-databind-2.10.5.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /legend-depot-core-http/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar

Dependency Hierarchy:

  • legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-protocol-pure-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-shared-core-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-protocol-pure-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-shared-core-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)

Vulnerability Details

In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
Mend Note:

Publish Date: Oct 02, 2022 12:00 AM

URL: CVE-2022-42004

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.7


Suggested Fix

Type: Upgrade version

Origin: GHSA-rgv9-q543-rqg4

Release Date: Oct 02, 2022 12:00 AM

Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.7.1,com.fasterxml.jackson.core:jackson-databind:2.13.4

🔴CVE-2025-52999

Vulnerable Library - jackson-core-2.10.5.jar

Core Jackson processing abstractions (aka Streaming API), implementation for JSON

Library home page: http://fasterxml.com/

Path to dependency file: /legend-depot-core-authorisation/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.10.5/jackson-core-2.10.5.jar

Dependency Hierarchy:

  • legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
        • jackson-databind-2.10.5.1.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-engine-protocol-pure-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-shared-core-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-protocol-pure-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-engine-shared-core-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-core-2.10.5.jar (Vulnerable Library)

Vulnerability Details

Impact With older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. Patches jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in FasterXML/jackson-core#943. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. Workarounds Users should avoid parsing input files from untrusted sources.

Publish Date: Jun 27, 2025 05:00 PM

URL: CVE-2025-52999

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.7


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

🟠WS-2021-0616

Vulnerable Library - jackson-databind-2.10.5.1.jar

General data-binding functionality for Jackson: works on core streaming API

Library home page: http://github.com/FasterXML/jackson

Path to dependency file: /legend-depot-core-http/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.10.5.1/jackson-databind-2.10.5.1.jar

Dependency Hierarchy:

  • legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-protocol-pure-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-shared-core-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-protocol-pure-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-databind-2.10.5.1.jar (Vulnerable Library)
  • legend-engine-shared-core-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-databind-2.10.5.1.jar (Vulnerable Library)

Vulnerability Details

FasterXML jackson-databind before 2.12.6 and 2.13.1 there is DoS when using JDK serialization to serialize JsonNode.

Publish Date: Nov 20, 2021 12:00 AM

URL: WS-2021-0616

Threat Assessment

Exploit Maturity:N/A

EPSS:N/A

Score: 5.9


Suggested Fix

Type: Upgrade version

Origin: FasterXML/jackson-databind#3328

Release Date: Nov 20, 2021 12:00 AM

Fix Resolution : com.fasterxml.jackson.core:jackson-databind:2.12.6, 2.13.1; com.fasterxml.jackson.core:jackson-core:2.12.6, 2.13.1

🟠CVE-2025-49128

Vulnerable Library - jackson-core-2.10.5.jar

Core Jackson processing abstractions (aka Streaming API), implementation for JSON

Library home page: http://fasterxml.com/

Path to dependency file: /legend-depot-core-authorisation/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.10.5/jackson-core-2.10.5.jar

Dependency Hierarchy:

  • legend-depot-core-services-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-store-api-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-store-metrics-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar
      • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
        • jackson-databind-2.10.5.1.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-engine-protocol-pure-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-artifacts-refresh-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-authorisation-1.7.6-SNAPSHOT.jar
      • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
        • legend-engine-shared-core-4.4.5.jar
          • legend-engine-protocol-4.4.5.jar
            • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-core-http-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar
      • legend-engine-shared-core-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-core-tracing-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-shared-core-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-model-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-engine-protocol-pure-4.4.5.jar
      • legend-engine-protocol-4.4.5.jar
        • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-depot-store-mongo-1.7.6-SNAPSHOT.jar (Root Library)

    • legend-depot-model-1.7.6-SNAPSHOT.jar
      • legend-engine-protocol-pure-4.4.5.jar
        • legend-engine-protocol-4.4.5.jar
          • jackson-core-2.10.5.jar (Vulnerable Library)
  • legend-engine-shared-core-4.4.5.jar (Root Library)

    • legend-engine-protocol-4.4.5.jar
      • jackson-core-2.10.5.jar (Vulnerable Library)

Vulnerability Details

Overview A flaw in Jackson-core's "JsonLocation._appendSourceDesc" method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. Details The vulnerability affects the creation of exception messages like: JsonParseException: Unexpected character ... at [Source: (byte[])...] When "JsonFactory.createParser(byte[] data, int offset, int len)" is used, and an error occurs while parsing, the exception message should include a snippet from the specified logical payload. However, the method "_appendSourceDesc" ignores the "offset", and always starts reading from index "0". If the buffer contains residual sensitive data from a previous request, such as credentials or document contents, that data may be exposed if the exception is propagated to the client. The issue particularly impacts server applications using: * Pooled byte buffers (e.g., Netty) * Frameworks that surface parse errors in HTTP responses * Default Jackson settings (i.e., "INCLUDE_SOURCE_IN_LOCATION" is enabled) A documented real-world example is "CVE-2021-22145" (https://nvd.nist.gov/vuln/detail/CVE-2021-22145) in Elasticsearch, which stemmed from the same root cause. Attack Scenario An attacker sends malformed JSON to a service using Jackson and pooled byte buffers (e.g., Netty-based HTTP servers). If the server reuses a buffer and includes the parser’s exception in its HTTP 400 response, the attacker may receive residual data from previous requests. Proof of Concept byte[] buffer = new byte[1000]; System.arraycopy("SECRET".getBytes(), 0, buffer, 0, 6); System.arraycopy("{ "bad": }".getBytes(), 0, buffer, 700, 10); JsonFactory factory = new JsonFactory(); JsonParser parser = factory.createParser(buffer, 700, 20); parser.nextToken(); // throws exception // Exception message will include "SECRET" Patches This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via "PR #652" (FasterXML/jackson-core#652). All users should upgrade to version 2.13.0 or later. Workarounds If upgrading is not immediately possible, applications can mitigate the issue by: 1. Disabling exception message exposure to clients — avoid returning parsing exception messages in HTTP responses. 2. Disabling source inclusion in exceptions by setting: jsonFactory.disable(JsonFactory.Feature.INCLUDE_SOURCE_IN_LOCATION); This prevents Jackson from embedding any source content in exception messages, avoiding leakage. References * "Pull Request #652 (Fix implementation)" (FasterXML/jackson-core#652) * "CVE-2021-22145 (Elasticsearch exposure of this flaw)" (https://nvd.nist.gov/vuln/detail/CVE-2021-22145)

Publish Date: Jun 12, 2025 12:59 AM

URL: CVE-2025-49128

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 5.1


Suggested Fix

Type: Upgrade version

Origin: GHSA-wf8f-6423-gfxg

Release Date: Jun 12, 2025 12:59 AM

Fix Resolution : com.fasterxml.jackson.core:jackson-core:2.13.0

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions