A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fasterxml Subscribe
Jackson-databind Subscribe
Oncommand Workflow Automation Subscribe
Steelstore Cloud Integrated Storage Subscribe
Banking Platform Subscribe
Communications Billing And Revenue Management Subscribe
Communications Calendar Server Subscribe
Communications Cloud Native Core Network Slice Selection Function Subscribe
Communications Evolved Communications Application Server Subscribe
Global Lifecycle Management Nextgen Oui Framework Subscribe
Goldengate Application Adapters Subscribe
Jd Edwards Enterpriseone Orchestrator Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Primavera Gateway Subscribe
Retail Merchandising System Subscribe
Retail Sales Audit Subscribe
Siebel Engineering - Installer \& Deployment Subscribe
Trace File Analyzer Subscribe
Webcenter Portal Subscribe
Webcenter Sites Subscribe
Weblogic Server Subscribe
Amq Streams Subscribe
Enterprise Linux Subscribe
Enterprise Linux Server Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Cd Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Enterprise Bpms Platform Subscribe
Jboss Enterprise Brms Platform Subscribe
Jboss Fuse Subscribe
Jboss Single Sign On Subscribe
Openshift Application Runtimes Subscribe
Rhel Software Collections Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2030-1 jackson-databind security update
EUVD EUVD EUVD-2019-0750 A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
Github GHSA Github GHSA GHSA-gjmw-vf9h-g25v jackson-databind polymorphic typing issue
Ubuntu USN Ubuntu USN USN-4813-1 Jackson Databind vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 26 Aug 2024 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T01:40:16.110Z

Reserved: 2019-10-12T00:00:00

Link: CVE-2019-17531

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-12T21:15:08.570

Modified: 2024-11-21T04:32:27.613

Link: CVE-2019-17531

cve-icon Redhat

Severity : Important

Publid Date: 2019-10-12T00:00:00Z

Links: CVE-2019-17531 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses