Akansh Shandilya created KAFKA-6737: ---------------------------------------
Summary: Is Kafka imapcted by critical vulnerqbilty CVE-2018-7489 Key: KAFKA-6737 URL: https://issues.apache.org/jira/browse/KAFKA-6737 Project: Kafka Issue Type: Bug Components: packaging, security, unit tests Affects Versions: 1.0.1, 1.1.0, 0.10.1.0 Reporter: Akansh Shandilya Kafka is using FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 , which allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath. I have checked that all released versions of Kafka are using jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5. There are three open questions: Question1: Is Kafka imapcted by critical vulnerqbilty CVE-2018-7489? [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489] Question2: If answer of first question is Yes. Is there any workaround to fix it on released version. Question3: If answer of first question is Yes. Should we fix it in future versions? -- This message was sent by Atlassian JIRA (v7.6.3#76005)