[ https://issues.apache.org/jira/browse/SOLR-13110?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Kevin Risden updated SOLR-13110: -------------------------------- Priority: Major (was: Blocker) > CVE-2017-7525 Threat Level 9 Against Solr v7.6. org.codehaus.jackson : > jackson-mapper-asl : 1.9.13. .A deserialization flaw was discovered in the > jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, ... > --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- > > Key: SOLR-13110 > URL: https://issues.apache.org/jira/browse/SOLR-13110 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Affects Versions: 7.6 > Environment: RedHat Linux. May run from RHEL versions 5, 6 or 7 > but this issue is from Sonatype component scan and should be independent of > Linux platform version. > Reporter: RobertHathaway > Priority: Major > > We can't move to Solr 7 without fixing this issue flagged by Sonatype scan Of > Solr - 7.6.0 Build, > Using Scanner 1.56.0-01 > Threat Level 9 org.codehaus.jackson : jackson-mapper-asl : 1.9.13. > A deserialization flaw was discovered in the jackson-databind, versions > before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user > to perform code execution by sending the maliciously crafted input to the > readValue method of the ObjectMapper. > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525 -- This message was sent by Atlassian JIRA (v7.6.3#76005) --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org For additional commands, e-mail: dev-h...@lucene.apache.org