A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1831-1 | jackson-databind security update |
Github GHSA |
GHSA-cmfg-87vq-g5g4 | Deserialization of untrusted data in FasterXML jackson-databind |
Ubuntu USN |
USN-4813-1 | Jackson Databind vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 27 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-27T20:30:34.890Z
Reserved: 2019-06-13T00:00:00.000Z
Link: CVE-2019-12814
Updated: 2024-08-04T23:32:55.182Z
Status : Modified
Published: 2019-06-19T14:15:10.897
Modified: 2025-08-27T21:15:34.630
Link: CVE-2019-12814
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN