You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /modules/swagger-project-jakarta/modules/swagger-jaxrs2-jakarta/pom.xml
Path to vulnerable library: /pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/modules/swagger-project-jakarta/modules/swagger-maven-plugin-jakarta/target/lib/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
WhiteSource Note: After conducting further research, WhiteSource has determined that all versions of com.fasterxml.jackson.core:jackson-databind up to version 2.13.2 are vulnerable to CVE-2020-36518.
CVE-2020-36518 - High Severity Vulnerability
Vulnerable Library - jackson-databind-2.13.2.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to dependency file: /modules/swagger-project-jakarta/modules/swagger-jaxrs2-jakarta/pom.xml
Path to vulnerable library: /pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/pository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar,/modules/swagger-project-jakarta/modules/swagger-maven-plugin-jakarta/target/lib/jackson-databind-2.13.2.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.13.2/jackson-databind-2.13.2.jar
Dependency Hierarchy:
Found in HEAD commit: 67e3a3fad68a2903d2c3911cb6144409801a4894
Found in base branch: master
Vulnerability Details
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
WhiteSource Note: After conducting further research, WhiteSource has determined that all versions of com.fasterxml.jackson.core:jackson-databind up to version 2.13.2 are vulnerable to CVE-2020-36518.
Publish Date: 2022-03-11
URL: CVE-2020-36518
CVSS 3 Score Details (7.5)
Base Score Metrics:
The text was updated successfully, but these errors were encountered: