{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T13:14:31.761","vulnerabilities":[{"cve":{"id":"CVE-2019-12017","sourceIdentifier":"security-alert@hpe.com","published":"2019-10-24T15:15:31.387","lastModified":"2024-11-21T04:22:08.867","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code execution vulnerability exists in MapR CLDB code, specifically in the JSON framework that is used in the CLDB code that handles login and ticket issuance. An attacker can use the 'class' property of the JSON request sent to the CLDB to influence the JSON library's decision on which Java class this JSON request is deserialized to. By doing so, the attacker can force the MapR CLDB to construct a URLClassLoader which loads a malicious Java class from a remote path and instantiate this object in the MapR CLDB, thus executing arbitrary code on the machine running the MapR CLDB and take over the cluster. By switching to the newer Jackson library and ensuring that all incoming JSON requests are only deserialized to the same class that it was serialized from, the vulnerability is fixed. This vulnerability affects the entire MapR core platform."},{"lang":"es","value":"Se presenta una vulnerabilidad de ejecución de código remota en el código de MapR CLDB, específicamente en el framework JSON que es usado en el código de CLDB que maneja el inicio de sesión y la emisión de tickets. Un atacante puede usar la propiedad \"class\" de la petición JSON enviada al CLDB para influir en la decisión de la biblioteca JSON sobre a qué clase de Java es deserializada esta petición JSON. Al hacerlo, el atacante puede forzar el MapR CLDB para construir un URLClassLoader que carga una clase Java maliciosa desde una ruta remota e instanciar este objeto en el MapR CLDB, ejecutando así un código arbitrario en la máquina que ejecuta el MapR CLDB y tomar el control del clúster . Al cambiar a la nueva biblioteca Jackson y asegurando que todas las peticiones JSON entrantes solo son deserializadas en la misma clase desde la que fueron serializadas, se corrige la vulnerabilidad. Esta vulnerabilidad afecta a toda la plataforma principal de MapR."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mapr:mapr:*:*:*:*:*:*:*:*","versionEndExcluding":"5.2.2","matchCriteriaId":"B14B954A-9EAA-44E7-905F-DAC8CA9BB534"}]}]}],"references":[{"url":"https://mapr.com/support/s/article/Remote-code-execution-vulnerability-in-MapR-MFS-CLDB?language=en_US","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://mapr.com/support/s/article/Remote-code-execution-vulnerability-in-MapR-MFS-CLDB?language=en_US","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}