A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
Geode
Subscribe
|
|
Fasterxml
Subscribe
|
Jackson-databind
Subscribe
|
|
Redhat
Subscribe
|
Decision Manager
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Cd
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Enterprise Brms Platform
Subscribe
Jboss Fuse
Subscribe
Jboss Single Sign On
Subscribe
Openshift Application Runtimes
Subscribe
Openshift Container Platform
Subscribe
Process Automation
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0420 | A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. |
Github GHSA |
GHSA-cf6r-3wgc-h863 | Polymorphic deserialization of malicious object in jackson-databind |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T00:26:39.136Z
Reserved: 2019-08-10T00:00:00.000Z
Link: CVE-2019-14892
No data.
Status : Modified
Published: 2020-03-02T17:15:17.813
Modified: 2024-11-21T04:27:37.527
Link: CVE-2019-14892
OpenCVE Enrichment
No data.
EUVD
Github GHSA