This repository has been archived by the owner on May 14, 2021. It is now read-only.
CVE-2019-14893 (High) detected in jackson-databind-2.5.0.jar #52
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2019-14893 - High Severity Vulnerability
Vulnerable Library - jackson-databind-2.5.0.jar
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to vulnerable library: idea-collaborator-plugin/client/lib/jackson-databind-2.5.0.jar,idea-collaborator-plugin/collabplugin/collaborator/collaborator/lib/jackson-databind-2.5.0.jar,idea-collaborator-plugin/collaborator-0_7-BETA/collaborator/lib/jackson-databind-2.5.0.jar
Dependency Hierarchy:
Found in HEAD commit: 3e67fb2d437ffeadf07751b7979f4e35dbc282a2
Found in base branch: master
Vulnerability Details
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as
enableDefaultTyping()
or when @JsonTypeInfo is usingId.CLASS
orId.MINIMAL_CLASS
or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.Publish Date: 2020-03-02
URL: CVE-2019-14893
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893
Release Date: 2020-03-02
Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0
The text was updated successfully, but these errors were encountered: