An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
{ "vanir_signatures": [ { "id": "CVE-2018-12023-e06040f4", "signature_type": "Line", "digest": { "line_hashes": [ "128796644907170208752938553446425314383", "115869816375365235010073422641981820603", "242058207014165142330415616712348705206" ], "threshold": 0.9 }, "target": { "file": "src/main/java/com/fasterxml/jackson/databind/jsontype/impl/SubTypeValidator.java" }, "deprecated": false, "signature_version": "v1", "source": "https://github.com/fasterxml/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a" } ] }