A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2020:0729 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893 | Issue Tracking Patch Third Party Advisory |
https://github.com/FasterXML/jackson-databind/issues/2469 | Third Party Advisory |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | |
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E | |
https://security.netapp.com/advisory/ntap-20200327-0006/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2020.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2020-03-02T20:11:32
Updated: 2020-10-20T21:14:57
Reserved: 2019-08-10T00:00:00
Link: CVE-2019-14893
JSON object: View
NVD Information
Status : Modified
Published: 2020-03-02T21:15:17.520
Modified: 2023-11-07T03:05:21.523
Link: CVE-2019-14893
JSON object: View
Redhat Information
No data.