First published: Tue Jul 30 2019(Updated: )
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2, 2.8.11.4, 2.7.9.6, and 2.6.7.3. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jackson-databind | 2.9.8-3+deb10u3 2.9.8-3+deb10u5 2.12.1-1+deb11u1 2.14.0-1 | |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.8.0<2.8.11.4 | 2.8.11.4 |
maven/com.fasterxml.jackson.core:jackson-databind | <2.6.7.3 | 2.6.7.3 |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.7.0<2.7.9.6 | 2.7.9.6 |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.9.0<2.9.9.2 | 2.9.9.2 |
redhat/jackson-databind | <2.9.10 | 2.9.10 |
redhat/jackson-databind | <2.8.11.4 | 2.8.11.4 |
redhat/jackson-databind | <2.7.9.6 | 2.7.9.6 |
redhat/jackson-databind | <2.6.7.3 | 2.6.7.3 |
FasterXML jackson-databind | >=2.0.0<2.6.7.3 | |
FasterXML jackson-databind | >=2.7.0<2.7.9.6 | |
FasterXML jackson-databind | >=2.8.0<2.8.11.4 | |
FasterXML jackson-databind | >=2.9.0<2.9.9.2 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =29 | |
Fedora | =30 | |
Apache Drill | =1.16.0 | |
Red Hat JBoss Middleware | =1.0 | |
oracle banking platform | =2.4.0 | |
oracle banking platform | =2.4.1 | |
oracle banking platform | =2.5.0 | |
oracle banking platform | =2.6.0 | |
oracle banking platform | =2.6.1 | |
oracle banking platform | =2.7.0 | |
oracle banking platform | =2.7.1 | |
Oracle Communications Diameter Signaling Router | =8.0.0 | |
Oracle Communications Diameter Signaling Router | =8.1 | |
Oracle Communications Diameter Signaling Router | =8.2 | |
Oracle Communications Diameter Signaling Router | =8.2.1 | |
Oracle Communications Instant Messaging Server | =10.0.1.3.0 | |
Oracle Financial Services Analytical Applications Infrastructure | >=8.0.2<=8.0.8 | |
oracle global lifecycle management opatch | <11.2.0.3.23 | |
oracle global lifecycle management opatch | >=12.2.0.1.0<12.2.0.1.19 | |
oracle global lifecycle management opatch | >=13.9.4.0.0<13.9.4.2.1 | |
oracle global lifecycle management opatch | =11.2.0.3.23 | |
oracle global lifecycle management opatch | =13.9.4.2.1 | |
Oracle GoldenGate Stream Analytics | <19.1.0.0.1 | |
Oracle JD Edwards EnterpriseOne Orchestrator | =9.2 | |
Oracle JD Edwards EnterpriseOne Tools | =9.2 | |
oracle primavera gateway | >=17.7<=17.12 | |
oracle primavera gateway | =15.2 | |
oracle primavera gateway | =16.1 | |
oracle primavera gateway | =16.2 | |
oracle primavera gateway | =18.8.0 | |
Oracle Customer Management and Segmentation Foundation | =17.0 | |
Oracle Retail Xstore Office Cloud Service | =7.1 | |
Oracle Retail Xstore Office Cloud Service | =15.0 | |
Oracle Retail Xstore Office Cloud Service | =16.0 | |
Oracle Retail Xstore Office Cloud Service | =17.0 | |
Oracle Retail Xstore Office Cloud Service | =18.0 | |
Oracle Siebel Engineering - Installer & Deployment | <=19.8 | |
Oracle Siebel User Interface Framework | <=19.10 | |
IBM Rational Quality Manager | <=6.0.6.1 | |
IBM Rational Quality Manager | <=6.0.6 | |
IBM Engineering Test Management (ETM) | <=7.0.0 | |
IBM Rational Quality Manager | <=6.0.2 | |
IBM Engineering Workflow Management (EWM) | <=7.0 | |
IBM Engineering Lifecycle Management | <=6.0.6.1 | |
IBM Engineering Lifecycle Management | <=6.0.6 | |
IBM Engineering Lifecycle Management (ELM) | <=7.0 | |
IBM Engineering Lifecycle Management | <=6.0.2 | |
IBM Rational DOORS Next Generation | <=6.0.2 | |
IBM Rational DOORS Next Generation | <=6.0.6.1 | |
IBM Rational DOORS Next Generation | <=6.0.6 | |
IBM Rational DOORS Next Generation | <=7.0 |
The following conditions are needed for an exploit, we recommend avoiding all if possible * Deserialization from sources you do not control * `enableDefaultTyping()` * `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14439 has a moderate severity rating due to potential security risks related to polymorphic typing in certain configurations of the Jackson-databind library.
To fix CVE-2019-14439, update jackson-databind to version 2.9.9.2, 2.8.11.4, 2.7.9.6, or 2.6.7.3 or higher.
CVE-2019-14439 affects multiple versions of the FasterXML jackson-databind library across various applications, including those provided by Debian and IBM.
CVE-2019-14439 allows attackers to exploit polymorphic typing issues, potentially leading to remote code execution on systems with vulnerable configurations.
Using default typing in JSON endpoints can be risky after CVE-2019-14439; it is advisable to avoid or limit its use unless the library is updated.