Description
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0420 | A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. |
Github GHSA |
GHSA-cf6r-3wgc-h863 | Polymorphic deserialization of malicious object in jackson-databind |
References
History
No history.
Subscriptions
Apache
Subscribe
Geode
Subscribe
Fasterxml
Subscribe
Jackson-databind
Subscribe
Redhat
Subscribe
Decision Manager
Subscribe
Jboss Data Grid
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Cd
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Enterprise Brms Platform
Subscribe
Jboss Fuse
Subscribe
Jboss Single Sign On
Subscribe
Openshift Application Runtimes
Subscribe
Openshift Container Platform
Subscribe
Process Automation
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T00:26:39.136Z
Reserved: 2019-08-10T00:00:00.000Z
Link: CVE-2019-14892
No data.
Status : Modified
Published: 2020-03-02T17:15:17.813
Modified: 2024-11-21T04:27:37.527
Link: CVE-2019-14892
OpenCVE Enrichment
No data.
EUVD
Github GHSA