7.5
CWE
502 200
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2019-14439: Infoleak

First published: Tue Jul 30 2019(Updated: )

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2, 2.8.11.4, 2.7.9.6, and 2.6.7.3. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.

Credit: cve@mitre.org cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
debian/jackson-databind
2.9.8-3+deb10u3
2.9.8-3+deb10u5
2.12.1-1+deb11u1
2.14.0-1
maven/com.fasterxml.jackson.core:jackson-databind>=2.8.0<2.8.11.4
2.8.11.4
maven/com.fasterxml.jackson.core:jackson-databind<2.6.7.3
2.6.7.3
maven/com.fasterxml.jackson.core:jackson-databind>=2.7.0<2.7.9.6
2.7.9.6
maven/com.fasterxml.jackson.core:jackson-databind>=2.9.0<2.9.9.2
2.9.9.2
redhat/jackson-databind<2.9.10
2.9.10
redhat/jackson-databind<2.8.11.4
2.8.11.4
redhat/jackson-databind<2.7.9.6
2.7.9.6
redhat/jackson-databind<2.6.7.3
2.6.7.3
FasterXML jackson-databind>=2.0.0<2.6.7.3
FasterXML jackson-databind>=2.7.0<2.7.9.6
FasterXML jackson-databind>=2.8.0<2.8.11.4
FasterXML jackson-databind>=2.9.0<2.9.9.2
Debian=8.0
Debian=9.0
Debian=10.0
Fedora=29
Fedora=30
Apache Drill=1.16.0
Red Hat JBoss Middleware=1.0
oracle banking platform=2.4.0
oracle banking platform=2.4.1
oracle banking platform=2.5.0
oracle banking platform=2.6.0
oracle banking platform=2.6.1
oracle banking platform=2.7.0
oracle banking platform=2.7.1
Oracle Communications Diameter Signaling Router=8.0.0
Oracle Communications Diameter Signaling Router=8.1
Oracle Communications Diameter Signaling Router=8.2
Oracle Communications Diameter Signaling Router=8.2.1
Oracle Communications Instant Messaging Server=10.0.1.3.0
Oracle Financial Services Analytical Applications Infrastructure>=8.0.2<=8.0.8
oracle global lifecycle management opatch<11.2.0.3.23
oracle global lifecycle management opatch>=12.2.0.1.0<12.2.0.1.19
oracle global lifecycle management opatch>=13.9.4.0.0<13.9.4.2.1
oracle global lifecycle management opatch=11.2.0.3.23
oracle global lifecycle management opatch=13.9.4.2.1
Oracle GoldenGate Stream Analytics<19.1.0.0.1
Oracle JD Edwards EnterpriseOne Orchestrator=9.2
Oracle JD Edwards EnterpriseOne Tools=9.2
oracle primavera gateway>=17.7<=17.12
oracle primavera gateway=15.2
oracle primavera gateway=16.1
oracle primavera gateway=16.2
oracle primavera gateway=18.8.0
Oracle Customer Management and Segmentation Foundation=17.0
Oracle Retail Xstore Office Cloud Service=7.1
Oracle Retail Xstore Office Cloud Service=15.0
Oracle Retail Xstore Office Cloud Service=16.0
Oracle Retail Xstore Office Cloud Service=17.0
Oracle Retail Xstore Office Cloud Service=18.0
Oracle Siebel Engineering - Installer & Deployment<=19.8
Oracle Siebel User Interface Framework<=19.10
IBM Rational Quality Manager<=6.0.6.1
IBM Rational Quality Manager<=6.0.6
IBM Engineering Test Management (ETM)<=7.0.0
IBM Rational Quality Manager<=6.0.2
IBM Engineering Workflow Management (EWM)<=7.0
IBM Engineering Lifecycle Management<=6.0.6.1
IBM Engineering Lifecycle Management<=6.0.6
IBM Engineering Lifecycle Management (ELM)<=7.0
IBM Engineering Lifecycle Management<=6.0.2
IBM Rational DOORS Next Generation<=6.0.2
IBM Rational DOORS Next Generation<=6.0.6.1
IBM Rational DOORS Next Generation<=6.0.6
IBM Rational DOORS Next Generation<=7.0

Remedy

The following conditions are needed for an exploit, we recommend avoiding all if possible * Deserialization from sources you do not control * `enableDefaultTyping()` * `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2019-14439?

    CVE-2019-14439 has a moderate severity rating due to potential security risks related to polymorphic typing in certain configurations of the Jackson-databind library.

  • How do I fix CVE-2019-14439?

    To fix CVE-2019-14439, update jackson-databind to version 2.9.9.2, 2.8.11.4, 2.7.9.6, or 2.6.7.3 or higher.

  • What software is affected by CVE-2019-14439?

    CVE-2019-14439 affects multiple versions of the FasterXML jackson-databind library across various applications, including those provided by Debian and IBM.

  • What types of attacks does CVE-2019-14439 enable?

    CVE-2019-14439 allows attackers to exploit polymorphic typing issues, potentially leading to remote code execution on systems with vulnerable configurations.

  • Is it safe to use default typing in JSON endpoints after CVE-2019-14439?

    Using default typing in JSON endpoints can be risky after CVE-2019-14439; it is advisable to avoid or limit its use unless the library is updated.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203