On 12/6/2017 9:40 PM, upendar devu wrote:
> is this impact for those using Struts based REST plugin ?

CVE-2017-15707 [1] is for those using Struts' REST Plugin [2]. Before 
2.5.14.1 this plugin uses json-lib library [3] which is not updated for 
several years and is vulnerable. After 2.5.14 Struts replaced this 
library with jackson.

> I'm not using this but below jackson versions are being used . are we 
> impacted ?
>  please confirm along with detailed problem statement who will be impacted on 
> these 2CVEs.
> 
>  jackson-annotations-2.7.0.jar
>  jackson-module-jaxb-annotations-2.7.1.jar
>  jackson-jaxrs-json-provider-2.7.1.jar
>  jackson-jaxrs-base-2.7.1.jar
>  jackson-databind-2.7.1.jar
>  jackson-core-2.7.1.jar

Yes you're impacted. "A vulnerability was detected in the latest Jackson 
JSON library, which was reported here. Upgrade com.fasterxml.jackson to 
version 2.9.2 to address CVE-2017-7525" [4]. If you don't use Struts' 
REST Plugin then you still are impacted because this vulnerability is 
with jackson itself [5].

Hope these help,
Yasser.

[1] https://cwiki.apache.org/confluence/display/WW/S2-054
[2] https://mvnrepository.com/artifact/org.apache.struts/struts2-rest-plugin
[3] https://sourceforge.net/projects/json-lib/files/
[4] https://cwiki.apache.org/confluence/display/WW/S2-055
[5] 
https://github.com/FasterXML/jackson-databind/issues/1599#issuecomment-342983770

Reply via email to