9.8
CVSSv3

CVE-2017-7525

Published: 06/02/2018 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 672
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A deserialization flaw exists in the jackson-databind, versions prior to 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fasterxml jackson-databind

fasterxml jackson-databind 2.9.0

debian debian linux 8.0

debian debian linux 9.0

netapp oncommand balance -

netapp snapcenter -

netapp oncommand shift -

netapp oncommand performance manager -

redhat openshift_container_platform 4.1

redhat virtualization 4.0

redhat virtualization_host 4.0

redhat jboss_enterprise_application_platform 6.0.0

redhat jboss_enterprise_application_platform 6.4.0

redhat jboss_enterprise_application_platform 7.0

redhat jboss_enterprise_application_platform 7.1

redhat openshift container platform 3.11

oracle primavera unifier 16.2

oracle banking platform 2.5.0

oracle primavera unifier 16.1

oracle webcenter portal 12.2.1.3.0

oracle financial services analytical applications infrastructure 8.0.5.0.0

oracle financial services analytical applications infrastructure 8.0.4.0.0

oracle financial services analytical applications infrastructure 8.0.3.0.0

oracle financial services analytical applications infrastructure 8.0.2.0.0

oracle primavera unifier

oracle communications billing and revenue management 7.5

oracle communications billing and revenue management 12.0

oracle banking platform 2.6.0

oracle banking platform 2.6.1

oracle banking platform 2.6.2

oracle enterprise manager for virtualization 13.2.2

oracle enterprise manager for virtualization 13.2.3

oracle enterprise manager for virtualization 13.3.1

oracle primavera unifier 18.8

oracle communications instant messaging server 10.0.1

oracle communications communications policy management

oracle financial services analytical applications infrastructure 8.0.7.0.0

oracle financial services analytical applications infrastructure 8.0.6.0.0

oracle communications diameter signaling route

oracle utilities advanced spatial and operational analytics 2.7.0.1

oracle communications instant messaging server 10.0.1.2.0

oracle global lifecycle management opatchauto

Vendor Advisories

Liao Xinxi discovered that jackson-databind, a Java library used to parse JSON and other data formats, did not properly validate user input before attemtping deserialization This allowed an attacker to perform code execution by providing maliciously crafted input For the oldstable distribution (jessie), this problem has been fixed in version 24 ...
It was discovered that jackson-databind, a Java library used to parse JSON and other data formats, improperly validated user input prior to deserializing because of an incomplete fix for CVE-2017-7525 For the oldstable distribution (jessie), this problem has been fixed in version 242-2+deb8u4 For the stable distribution (stretch), this problem ...
Debian Bug report logs - #870848 jackson-databind: CVE-2017-7525: Deserialization vulnerability via readValue method of ObjectMapper Package: src:jackson-databind; Maintainer for src:jackson-databind is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debian ...
Debian Bug report logs - #888318 jackson-databind: CVE-2017-17485 Package: src:jackson-databind; Maintainer for src:jackson-databind is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 24 Jan 2018 22:12:05 UTC Severity: grave Tags ...
Debian Bug report logs - #888316 jackson-databind: CVE-2018-5968 Package: src:jackson-databind; Maintainer for src:jackson-databind is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 24 Jan 2018 22:06:02 UTC Severity: grave Tags: ...
Debian Bug report logs - #891614 jackson-databind: CVE-2018-7489: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries Package: src:jackson-databind; Maintainer for src:jackson-databind is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso < ...
A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 6420 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 64 for Red Hat Enterprise Linux 5Red Hat Product Security has rated this update as having a ...
Synopsis Important: Red Hat JBoss Data Grid 712 security update Type/Severity Security Advisory: Important Topic Red Hat JBoss Data Grid 712 is now available for download from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabil ...
Synopsis Important: Red Hat Fuse 73 security update Type/Severity Security Advisory: Important Topic A minor version update (from 72 to 73) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security has ...
Synopsis Important: devtoolset-4-jackson-databind security update Type/Severity Security Advisory: Important Topic An update for devtoolset-4-jackson-databind is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common V ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform 713 security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat JBoss Enterprise Application Platform 71Red Hat Product Security has rated this update as having a security impact of Moderate A Co ...
Synopsis Important: jboss-ec2-eap package for EAP 711 Type/Severity Security Advisory: Important Topic An update for eap7-jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 711 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 711 for Red Ha ...
Synopsis Important: Red Hat JBoss BPM Suite 649 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss BPM SuiteRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 707 on RHEL 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 70 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a securi ...
Synopsis Important: JBoss Enterprise Application Platform 711 on RHEL 6 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 71 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impac ...
Synopsis Important: Satellite 64 security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat Satellite 64 for RHEL 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: rh-eclipse46-jackson-databind security update Type/Severity Security Advisory: Important Topic An update for rh-eclipse46-jackson-databind is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common V ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 710 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 71 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 710 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 71 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a ...
Synopsis Moderate: Red Hat OpenShift Application Runtimes Thorntail 220 security & bug fix update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Application RuntimesRed Hat Product Security has rated this update as having a security impactof Moderate ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat JBoss Enterprise Application Platform 71 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security ...
Synopsis Important: JBoss Enterprise Application Platform 711 for RHEL 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 71 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impa ...
Synopsis Important: eap7-jboss-ec2-eap security update Type/Severity Security Advisory: Important Topic An update for eap7-jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 70 for RHEL 6 and Red Hat JBoss Enterprise Application Platform 70 for RHEL 7Red Hat Product Security ...
Synopsis Critical: Red Hat FIS 20 on Fuse 630 R8 security and bug fix update Type/Severity Security Advisory: Critical Topic An update is now available for Red Hat Fuse Integration ServicesRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scor ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 707 on RHEL 6 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 70 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a securi ...
Synopsis Important: eap7-jboss-ec2-eap security update Type/Severity Security Advisory: Important Topic An update for eap7-jboss-ec2-eap is now available for Red Hat JBoss Enterprise Application Platform 71 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 71 for Red Hat Ent ...
Synopsis Important: Red Hat JBoss BRMS 649 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss BRMSRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, wh ...
Synopsis Important: OpenShift Container Platform logging-elasticsearch5-container security update Type/Severity Security Advisory: Important Topic An update for logging-elasticsearch5-container is now available for Red Hat OpenShift Container Platform 311Red Hat Product Security has rated this update as h ...
Synopsis Moderate: Red Hat OpenShift Application Runtimes security and bug fix update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Application RuntimesRed Hat Product Security has rated this update as having a security impactof Moderate A Common Vulnerab ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 6420 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 64 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a ...
Synopsis Important: rhvm-appliance security and enhancement update Type/Severity Security Advisory: Important Topic An update for rhvm-appliance is now available for Red Hat Virtualization 4 for RHEL-7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerab ...
Synopsis Important: rh-eclipse46-jackson-databind security update Type/Severity Security Advisory: Important Topic An update for rh-eclipse46-jackson-databind is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common V ...
Synopsis Important: rh-maven35-jackson-databind security update Type/Severity Security Advisory: Important Topic An update for rh-maven35-jackson-databind is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulne ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 711 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application PlatformRed Hat Product Security has rated this update as having a security impact of Important A Com ...
Synopsis Moderate: Red Hat JBoss Enterprise Application Platform security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat JBoss Enterprise Application Platform 71 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security ...
Synopsis Important: Red Hat Fuse 750 security update Type/Severity Security Advisory: Important Topic A minor version update (from 74 to 75) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security h ...
Synopsis Important: eap6-jboss-ec2-eap security update Type/Severity Security Advisory: Important Topic An update for jboss-ec2-eap is now available for Red Hat JBoss EnterpriseApplication Platform 64 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 6420 security update Type/Severity Security Advisory: Important Topic Updated packages that provide Red Hat JBoss Enterprise Application Platform6420, fixes several bugs, and adds various enhancements are now available from the Red Hat Cu ...
Synopsis Important: rh-eclipse46-jackson-databind security update Type/Severity Security Advisory: Important Topic An update for rh-eclipse46-jackson-databind is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common V ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 707 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application PlatformRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabilit ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 6420 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 64 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 710 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application PlatformRed Hat Product Security has rated this update as having a security impact of Important A Com ...
Synopsis Important: rh-eclipse47-jackson-databind security update Type/Severity Security Advisory: Important Topic An update for rh-eclipse47-jackson-databind is now available for Red Hat Developer ToolsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulner ...
Synopsis Important: OpenShift Container Platform 4118 logging-elasticsearch5 security update Type/Severity Security Advisory: Important Topic An update for logging-elasticsearch5-container is now available for Red Hat OpenShift Container Platform 41Red Hat Product Security has rated this update as havin ...
Synopsis Important: rhvm-appliance security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for rhvm-appliance is now available for RHEV 4X RHEV-H and Agents for RHEL-7Red Hat Product Security has rated this update as having a security impact of Important A Com ...
Synopsis Important: EAP Continuous Delivery Technical Preview Release 13 security update Type/Severity Security Advisory: Important Topic This is a security update for JBoss EAP Continuous Delivery 130Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnera ...
Multiple vulnerabilities have been found in Hitachi Ops Center Common Services CVE-2017-7525, CVE-2017-15095, CVE-2020-14389, CVE-2020-25694, CVE-2020-25695, CVE-2020-25696, CVE-2020-35490, CVE-2020-35491 Affected products and versions are listed below Please upgrade your version to the appropriate version ...

Github Repositories

Client and walkthrough for the Jackson JSON Deserialization CTF.

The Royals Quiz (king-of-pop) CTF A CTF to demonstrate Jackson's JSON deserialization vulnerability (CVE-2017-7525) Setup Run the server server readme git clone githubcom/CatalanCabbage/king-of-pop-servergit cd king-of-pop-server/package #Extract the packagezip file present in this folder java -jar target/king-of-pop-10-SNAPSHOTjar

Insecure Java Deserialization Lab

CVE-2017-7525 Java Insecure Deserialization Lab Basic Java REST application vulnerable to Insecure Deserialization, leading to RCE The project must be run on Java < 8u45 Based on Maven with the following dependencies: jackson-databind 222 commons-collections 31 spring-context-support 4311 More dependencies can be added through Maven if you want to try some more g

jackson-databind-exploit

jackson-databind-exploit Example exploit of CVE-2017-7525 This application runs a local Dropwizard web server on port 8888 under the /application context There is one route /application/echo which echos back the JSON that you send it exploitjson: The JSON payload to send the server This tells the server to download an XML file from localhost:8000/spelxml spelxml: The XM

Jackson 反序列化 漏洞描述 CVE-2017-7525 CVE-2017-7525详情 githubcom/iBearcat/S2-055 官方在漏洞产生后,通过黑名单的方式禁止黑名单中的第三方库反序列化问题而产生的代码执行漏洞,黑名单是一种不可靠的修复方式,攻击者常常可以通过一些手段绕过黑名单,造成新漏洞产生,可以说是S2-055

ZeroNights-WebVillage-2017 Tasks are based on the presentation from ZeroNights 2017 Several simple webapps with deserialization vulnerabilities in Docker containers Python Pickle docker run -p 8080:80 greendog/wv_python wwwcsuicedu/~s/musings/pickle/ blognelhagecom/2011/03/exploiting-pickle/ Nodejs node-serialize docker run -p 8080:8080 greendog/

Jackson Deserialization CVE-2017-7525 PoC

jackson-deserialization-2017-7525 Jackson Deserialization CVE-2017-7525 PoC

Package $ sbt stage $ file /target/helloshiftleft-play-jpa-scala-001-SNAPSHOTjar Run $ sbt run Http routes See routes at config/routes Use localhost as host name in the URLs To interact with the endpoints use curl (or any other tool) GET /account GET /createCustomer POST /account curl localhos

Vulnerable Play application The point for this repo is to show how easy is to do XXE attack on old version of the framework Steps Step 1 Run the app sbt run Step 2 Create a service to serve malicious content ruby -rwebrick -e'WEBrick::HTTPServernew(:Port => 8000, :DocumentRoot => Dirpwd)start' Step 3 Create malicious input as file testdtd <!

An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions

jackson-rce-via-spel An example project that exploits the default typing issue in Jackson-databind (githubcom/FasterXML/jackson-databind) via Spring application contexts and expressions Context The Jackson-databind project has a feature called default-typing (not enabled by default) When the target class has some polymorph fields inside (such as interfaces, abstract c

vulnerable play app

Package $ sbt stage $ file /target/helloshiftleftplay-000-SNAPSHOTjar Run $ sbt run Http routes See routes at config/routes Use localhost as host name in the URLs To interact with the endpoints use curl (or any other tool) GET /account GET /createCustomer POST /account curl localhost:8082

Writeups Web Facebook mediumcom/bugbountywriteup/disclose-private-attachments-in-facebook-messenger-infrastructure-15-000-ae13602aa486 wwwvulnanocom/2019/03/facebook-messenger-server-random-memoryhtml vinothkumarme/20000-facebook-dom-xss/ Google wwwezequieltech/p/36k-google-app-engine-rcehtml wwwezequieltech/p/10k-host-header

Insecure Java Deserialization in the Jackson Library & How It Can Escalate to RCE Insecure deserialization is a security vulnerability that occurs when a software application deserializes data from an untrusted or malicious source without proper validation and protection This vulnerability can be exploited by attackers to execute arbitrary code, gain unauthorized acces

spel.xml

jackson-rce-via-spel An example project that exploits the default typing issue in Jackson-databind (githubcom/FasterXML/jackson-databind) via Spring application contexts and expressions Context The Jackson-databind project has a feature called default-typing (not enabled by default) When the target class has some polymorph fields inside (such as interfaces, abstract c

Project code and dependent component analysis tools.

clocwalk Project code and dependent component analysis tools Dependent installation npm install -g cloc # wwwnpmjscom/package/cloc sudo apt install cloc # Debian, Ubuntu sudo yum install cloc # Red Hat, Fedora sudo dnf install cloc # Fedora 22 or later sudo pacman -S cloc

Check CVSS v3.1 and EPSS scores for a given CVE ID and whether its in CISA KEV catalog

CVE Risk Scores Check CVSS v31 and EPSS scores for a given CVE ID by querying the NIST NVD API and FIRST EPSS database Also check if the CVE is listed in the CISA Known Exploited Vulnerability (KEV) catalog About CVSS CVSS stands for Common Vulnerability Scoring System It is a standardized system for rating the severity of security vulnerabilities in software The CVSS scor

Package $ sbt stage $ file /target/helloshiftleft-play-jpa-scala-001-SNAPSHOTjar Run $ sbt run Http routes See routes at config/routes Use localhost as host name in the URLs To interact with the endpoints use curl (or any other tool) GET /account GET /createCustomer POST /account curl localhos

References

CWE-184https://github.com/FasterXML/jackson-databind/issues/1599https://github.com/FasterXML/jackson-databind/issues/1723https://bugzilla.redhat.com/show_bug.cgi?id=1462702https://www.debian.org/security/2017/dsa-4004https://security.netapp.com/advisory/ntap-20171214-0002/https://access.redhat.com/errata/RHSA-2017:3458https://access.redhat.com/errata/RHSA-2017:3456https://access.redhat.com/errata/RHSA-2017:3455https://access.redhat.com/errata/RHSA-2017:3454https://access.redhat.com/errata/RHSA-2017:3141https://access.redhat.com/errata/RHSA-2017:2638https://access.redhat.com/errata/RHSA-2017:2637https://access.redhat.com/errata/RHSA-2017:2636https://access.redhat.com/errata/RHSA-2017:2635https://access.redhat.com/errata/RHSA-2017:2633https://access.redhat.com/errata/RHSA-2017:2547https://access.redhat.com/errata/RHSA-2017:2546https://access.redhat.com/errata/RHSA-2017:2477https://access.redhat.com/errata/RHSA-2017:1840https://access.redhat.com/errata/RHSA-2017:1839https://access.redhat.com/errata/RHSA-2017:1837https://access.redhat.com/errata/RHSA-2017:1836https://access.redhat.com/errata/RHSA-2017:1835https://access.redhat.com/errata/RHSA-2017:1834http://www.securitytracker.com/id/1039947http://www.securitytracker.com/id/1039744http://www.securityfocus.com/bid/99623https://cwiki.apache.org/confluence/display/WW/S2-055https://access.redhat.com/errata/RHSA-2018:0294http://www.securitytracker.com/id/1040360https://access.redhat.com/errata/RHSA-2018:0342http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlhttps://access.redhat.com/errata/RHSA-2018:1450https://access.redhat.com/errata/RHSA-2018:1449http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_ushttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://access.redhat.com/errata/RHSA-2019:0910https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://access.redhat.com/errata/RHSA-2019:2858https://access.redhat.com/errata/RHSA-2019:3149https://lists.debian.org/debian-lts-announce/2020/01/msg00037.htmlhttps://lists.debian.org/debian-lts-announce/2020/08/msg00039.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.htmlhttps://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486%40%3Cdev.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f%40%3Cdev.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6%40%3Cdev.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913%40%3Cdev.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346%40%3Cdev.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b%40%3Ccommits.cassandra.apache.org%3Ehttps://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3Ehttps://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399%40%3Csolr-user.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87%40%3Csolr-user.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629%40%3Csolr-user.lucene.apache.org%3Ehttps://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589%40%3Cissues.spark.apache.org%3Ehttps://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c%40%3Ccommits.cassandra.apache.org%3Ehttps://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7%40%3Ccommits.cassandra.apache.org%3Ehttps://nvd.nist.govhttps://www.debian.org/security/./dsa-4004https://github.com/CatalanCabbage/king-of-pop