9.8
CVSSv3

CVE-2019-17531

CVSSv4: NA | CVSSv3: 9.8 | CVSSv2: 6.8 | VMScore: 1000 | EPSS: 0.0119 | KEV: Not Included
Published: 12/10/2019 Updated: 21/11/2024

Vulnerability Summary

A Polymorphic Typing issue exists in FasterXML jackson-databind 2.0.0 up to and including 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fasterxml jackson-databind

debian debian linux 8.0

redhat jboss enterprise application platform 7.2

redhat jboss enterprise application platform 7.3

oracle banking platform 2.4.0

oracle banking platform 2.4.1

oracle banking platform 2.5.0

oracle banking platform 2.6.0

oracle banking platform 2.6.1

oracle banking platform 2.6.2

oracle banking platform 2.7.0

oracle banking platform 2.7.1

oracle banking platform 2.9.0

oracle communications billing and revenue management 7.5.0.23.0

oracle communications billing and revenue management 12.0.0.3.0

oracle communications calendar server 8.0.0.2.0

oracle communications calendar server 8.0.0.3.0

oracle communications cloud native core network slice selection function 1.2.1

oracle communications evolved communications application server 7.1

oracle global lifecycle management nextgen oui framework 12.2.1.3.0

oracle global lifecycle management nextgen oui framework 12.2.1.4.0

oracle global lifecycle management nextgen oui framework 13.9.4.2.2

oracle goldengate application adapters 19.1.0.0.0

oracle jd edwards enterpriseone orchestrator 9.2

oracle jd edwards enterpriseone tools 9.2

oracle primavera gateway

oracle primavera gateway 16.1

oracle primavera gateway 16.2

oracle primavera gateway 19.12.0

oracle retail merchandising system 15.0.3

oracle retail merchandising system 16.0.2

oracle retail merchandising system 16.0.3

oracle retail sales audit 14.1

oracle siebel engineering - installer & deployment

oracle trace file analyzer 12.2.0.1

oracle trace file analyzer 18c

oracle trace file analyzer 19c

oracle webcenter portal 12.2.1.3.0

oracle webcenter portal 12.2.1.4.0

oracle webcenter sites 12.2.1.3.0

oracle webcenter sites 12.2.1.4.0

oracle weblogic server 12.2.1.3.0

oracle weblogic server 12.2.1.4.0

netapp oncommand workflow automation -

netapp steelstore cloud integrated storage -

Vendor Advisories

Synopsis Important: rh-maven35-jackson-databind security update Type/Severity Security Advisory: Important Topic An update for rh-maven35-jackson-databind is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Important A Common Vulne ...
Synopsis Moderate: Red Hat Process Automation Manager 770 Security Update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat Process Automation ManagerRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring ...
Synopsis Important: Red Hat AMQ Streams 140 release and security update Type/Severity Security Advisory: Important Topic Red Hat AMQ Streams 140 is now available from the Red Hat Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: Red Hat Decision Manager 770 Security Update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat Decision ManagerRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) bas ...
Synopsis Important: Red Hat Fuse 770 release and security update Type/Severity Security Advisory: Important Topic A minor version update (from 76 to 77) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Produc ...
Synopsis Moderate: pki-core:106 and pki-deps:106 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for the pki-core:106 and pki-deps:106 modules is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a se ...
Synopsis Important: EAP Continuous Delivery Technical Preview Release 19 security update Type/Severity Security Advisory: Important Topic This is a security update for JBoss EAP Continuous Delivery 19Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabi ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 726 on RHEL 6 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 72 for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as ...
Synopsis Important: Red Hat build of Thorntail 251 security and bug fix update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat build of ThorntailRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 726 on RHEL 7 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 72 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 726 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 72Red Hat Product Security has rated this update as having a security impact of Important ...
Synopsis Important: Red Hat JBoss Enterprise Application Platform 726 on RHEL 8 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Application Platform 72 for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as ...
Synopsis Important: Red Hat Single Sign-On 736 security update Type/Severity Security Advisory: Important Topic A security update is now available for Red Hat Single Sign-On 73 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Important A Common Vulne ...
Cosminexus Component Container contain the following vulnerabilities: CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, CVE-2019-14439, CVE-2019-14540, CVE-2019-14892, CVE-2019-14893, CVE-2019-16335, CVE-2019-16942, CVE-2019-16943, CVE-2019-17267, CVE-2019-17531, CVE-2019-20330, CVE-2020-8840, CVE-2020-9546, CVE-2020-9547, CVE-20 ...
Multiple vulnerabilities have been found in Hitachi Ops Center Analyzer viewpoint CVE-2018-10054, CVE-2018-14335, CVE-2018-20200, CVE-2019-10086, CVE-2019-12086, CVE-2019-12384, CVE-2019-12814, CVE-2019-14379, CVE-2019-14439, CVE-2019-14540, CVE-2019-14892, CVE-2019-14893, CVE-2019-16335, CVE-2019-16942, CVE-2019-16943, CVE-2019-17267, CVE-2019- ...

Github Repositories

GOJI HTTP Client GOJI stands for: Groovy-oriented and JSON-implying License Licensed under the Apache License, Version 20 (the "License"); you may not use this file except in compliance with the License You may obtain a copy of the License at wwwapacheorg/licenses/LICENSE-20 Unless required by applicable law or agreed to in writing, software distributed

Briefly summarize your client, Artemis Financial, and its software requirements Who was the client? What issue did the company want you to address? The client, Artemis Financial, is a financial services provider that handles sensitive client data, including savings plans, retirement details, investments, and insurance The company required a secure software application to prot

A wrapper around Apache 'httpclient' and Jackson 'databind' libraries with lean Groovy syntax

GOJI HTTP Client GOJI stands for: Groovy-oriented and JSON-implying License Licensed under the Apache License, Version 20 (the "License"); you may not use this file except in compliance with the License You may obtain a copy of the License at wwwapacheorg/licenses/LICENSE-20 Unless required by applicable law or agreed to in writing, software distributed

A Java agent that disables platform features you don't use, before an attacker uses them against you.

aegis4j Avoid the NEXT Log4Shell vulnerability! The Java platform has accrued a number of features over the years Some of these features are no longer commonly used, but their existence remains a security liability, providing attackers with a diverse toolkit to leverage against Java-based systems It is possible to eliminate some of this attack surface area by creating custom

References

CWE-502https://nvd.nist.govhttps://github.com/MayhemYDG/repo-3https://github.com/tomtom-international/goji-http-clienthttps://access.redhat.com/errata/RHSA-2019:4192https://www.first.org/epsshttps://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-109/index.htmlhttps://access.redhat.com/errata/RHSA-2019:4192https://access.redhat.com/errata/RHSA-2020:0159https://access.redhat.com/errata/RHSA-2020:0160https://access.redhat.com/errata/RHSA-2020:0161https://access.redhat.com/errata/RHSA-2020:0164https://access.redhat.com/errata/RHSA-2020:0445https://github.com/FasterXML/jackson-databind/issues/2498https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5%40%3Ccommits.pulsar.apache.org%3Ehttps://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3Ehttps://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f%40%3Ccommits.druid.apache.org%3Ehttps://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3Ehttps://lists.debian.org/debian-lts-announce/2019/12/msg00013.htmlhttps://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062https://security.netapp.com/advisory/ntap-20191024-0005/https://www.oracle.com//security-alerts/cpujul2021.htmlhttps://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://www.oracle.com/security-alerts/cpujan2020.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.htmlhttps://access.redhat.com/errata/RHSA-2019:4192https://access.redhat.com/errata/RHSA-2020:0159https://access.redhat.com/errata/RHSA-2020:0160https://access.redhat.com/errata/RHSA-2020:0161https://access.redhat.com/errata/RHSA-2020:0164https://access.redhat.com/errata/RHSA-2020:0445https://github.com/FasterXML/jackson-databind/issues/2498https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5%40%3Ccommits.pulsar.apache.org%3Ehttps://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3Ehttps://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f%40%3Ccommits.druid.apache.org%3Ehttps://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3Ehttps://lists.debian.org/debian-lts-announce/2019/12/msg00013.htmlhttps://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062https://security.netapp.com/advisory/ntap-20191024-0005/https://www.oracle.com//security-alerts/cpujul2021.htmlhttps://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://www.oracle.com/security-alerts/cpujan2020.htmlhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://www.oracle.com/security-alerts/cpuoct2020.html