CVE-2019-14893
Published: 2 March 2020
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
Priority
Status
Package | Release | Status |
---|---|---|
jackson-databind Launchpad, Ubuntu, Debian |
bionic |
Needed
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Not vulnerable
(2.10.0-2)
|
|
groovy |
Not vulnerable
(2.10.0-2)
|
|
hirsute |
Not vulnerable
(2.10.0-2)
|
|
impish |
Not vulnerable
(2.10.0-2)
|
|
jammy |
Not vulnerable
(2.10.0-2)
|
|
kinetic |
Not vulnerable
(2.10.0-2)
|
|
lunar |
Not vulnerable
(2.10.0-2)
|
|
mantic |
Not vulnerable
(2.10.0-2)
|
|
noble |
Not vulnerable
(2.10.0-2)
|
|
trusty |
Needs triage
|
|
upstream |
Released
(2.10.0-1)
|
|
xenial |
Not vulnerable
(code not present)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |