A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fasterxml Subscribe
Jackson-databind Subscribe
Fedoraproject Subscribe
Active Iq Unified Manager Subscribe
Oncommand Api Services Subscribe
Oncommand Workflow Automation Subscribe
Service Level Manager Subscribe
Steelstore Cloud Integrated Storage Subscribe
Banking Platform Subscribe
Communications Billing And Revenue Management Subscribe
Communications Calendar Server Subscribe
Communications Cloud Native Core Network Slice Selection Function Subscribe
Communications Evolved Communications Application Server Subscribe
Database Server Subscribe
Global Lifecycle Management Nextgen Oui Framework Subscribe
Goldengate Application Adapters Subscribe
Jd Edwards Enterpriseone Orchestrator Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Primavera Gateway Subscribe
Primavera Unifier Subscribe
Retail Merchandising System Subscribe
Retail Sales Audit Subscribe
Siebel Engineering - Installer \& Deployment Subscribe
Siebel Ui Framework Subscribe
Webcenter Portal Subscribe
Webcenter Sites Subscribe
Weblogic Server Subscribe
Amq Streams Subscribe
Enterprise Linux Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Cd Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Jboss Single Sign On Subscribe
Openshift Application Runtimes Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1943-1 jackson-databind security update
Debian DSA Debian DSA DSA-4542-1 jackson-databind security update
EUVD EUVD EUVD-2019-0709 A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
Github GHSA Github GHSA GHSA-mx7p-6679-8g3q Polymorphic Typing in FasterXML jackson-databind
Ubuntu USN Ubuntu USN USN-4813-1 Jackson Databind vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://access.redhat.com/errata/RHSA-2019:3901 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0159 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0160 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0161 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0164 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0445 cve-icon cve-icon
https://github.com/FasterXML/jackson-databind/issues/2478 cve-icon cve-icon
https://issues.apache.org/jira/browse/GEODE-7255 cve-icon cve-icon
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/7782a937c9259a58337ee36b2961f00e2d744feafc13084e176d0df5%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/a430dbc9be874c41314cc69e697384567a9a24025e819d9485547954%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b2e23c94f9dfef53e04c492e5d02e5c75201734be7adc73a49ef2370%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/ cve-icon cve-icon
https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-16942 cve-icon
https://seclists.org/bugtraq/2019/Oct/6 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20191017-0006/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-16942 cve-icon
https://www.debian.org/security/2019/dsa-4542 cve-icon cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:24:48.535Z

Reserved: 2019-09-29T00:00:00

Link: CVE-2019-16942

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-01T17:15:10.323

Modified: 2024-11-21T04:31:23.477

Link: CVE-2019-16942

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-09-27T00:00:00Z

Links: CVE-2019-16942 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses