
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-36518 affects jackson-databind versions before 2.13.0, allowing attackers to cause a Java StackOverflow exception and denial of service through a large depth of nested objects. The vulnerability was disclosed in March 2022 and impacts various software products that utilize the jackson-databind library (NVD, GitHub Issue).
The vulnerability exists in the implementation of UntypedObjectDeserializer in jackson-databind, which is prone to denial of service attacks when processing deeply nested object and array values. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating it can be exploited remotely without authentication (NVD).
Successful exploitation of this vulnerability can lead to denial of service (DoS) through Java StackOverflow exceptions. The vulnerability is particularly concerning as it can be triggered with relatively modest JVM memory by using documents with approximately ten thousand levels of nesting (GitHub Issue).
The vulnerability has been fixed in jackson-databind version 2.13.0 and later. Various vendors have released patches for their affected products, including Debian (versions 2.12.1-1+deb11u1), NetApp products, and Oracle systems. Organizations using affected versions should upgrade to the patched versions (Debian Advisory, NetApp Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."