View all vulnerabilities

CVE-2019-14892

Polymorphic deserialization of malicious object in jackson-databind

A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5, and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Versions
com.fasterxml.jackson.core:jackson-databind < 2.6.7.3; com.fasterxml.jackson.core:jackson-databind >= 2.7.0 < 2.8.11.5; com.fasterxml.jackson.core:jackson-databind >= 2.9.0 < 2.9.10
Severity
High
Ecosystem
Publish Date
May 15, 2020
Modified Date
February 18, 2024