[ 
https://issues.apache.org/jira/browse/SOLR-13110?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Risden closed SOLR-13110.
-------------------------------

> CVE-2017-7525  Threat Level 9 Against Solr v7.6.  org.codehaus.jackson : 
> jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the 
> jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ...
> ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>
>                 Key: SOLR-13110
>                 URL: https://issues.apache.org/jira/browse/SOLR-13110
>             Project: Solr
>          Issue Type: Bug
>      Security Level: Public(Default Security Level. Issues are Public) 
>    Affects Versions: 7.6
>         Environment: RedHat Linux.    May run from RHEL versions 5, 6 or 7 
> but this issue is from Sonatype component scan and should be independent of 
> Linux platform version.
>            Reporter: RobertHathaway
>            Priority: Major
>             Fix For: 8.0, master (9.0)
>
>
> We can't move to Solr 7 without fixing this issue flagged by Sonatype scan Of 
> Solr - 7.6.0 Build,
> Using Scanner 1.56.0-01
> Threat Level 9       org.codehaus.jackson : jackson-mapper-asl : 1.9.13.   
> A deserialization flaw was discovered in the jackson-databind, versions 
> before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user 
> to perform code execution by sending the maliciously crafted input to the 
> readValue method of the ObjectMapper.
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org

Reply via email to