CWE
502 200
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2019-16335: Infoleak

First published: Sun Sep 15 2019(Updated: )

A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10, 2.8.11.5, and 2.6.7.3. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.

Credit: cve@mitre.org cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
maven/com.fasterxml.jackson.core:jackson-databind<2.6.7.3
2.6.7.3
maven/com.fasterxml.jackson.core:jackson-databind>=2.7.0<2.8.11.5
2.8.11.5
maven/com.fasterxml.jackson.core:jackson-databind>=2.9.0<2.9.10
2.9.10
redhat/eap7-apache-cxf<0:3.2.11-1.redhat_00001.1.el6ea
0:3.2.11-1.redhat_00001.1.el6ea
redhat/eap7-glassfish-jsf<0:2.3.5-6.SP3_redhat_00004.1.el6ea
0:2.3.5-6.SP3_redhat_00004.1.el6ea
redhat/eap7-hal-console<0:3.0.19-1.Final_redhat_00001.1.el6ea
0:3.0.19-1.Final_redhat_00001.1.el6ea
redhat/eap7-hibernate<0:5.3.14-1.Final_redhat_00001.1.el6ea
0:5.3.14-1.Final_redhat_00001.1.el6ea
redhat/eap7-hibernate-validator<0:6.0.18-1.Final_redhat_00001.1.el6ea
0:6.0.18-1.Final_redhat_00001.1.el6ea
redhat/eap7-jackson-annotations<0:2.9.10-1.redhat_00003.1.el6ea
0:2.9.10-1.redhat_00003.1.el6ea
redhat/eap7-jackson-core<0:2.9.10-1.redhat_00003.1.el6ea
0:2.9.10-1.redhat_00003.1.el6ea
redhat/eap7-jackson-databind<0:2.9.10.1-1.redhat_00001.1.el6ea
0:2.9.10.1-1.redhat_00001.1.el6ea
redhat/eap7-jackson-dataformats-binary<0:2.9.10-1.redhat_00003.1.el6ea
0:2.9.10-1.redhat_00003.1.el6ea
redhat/eap7-jackson-dataformats-text<0:2.9.10-1.redhat_00003.1.el6ea
0:2.9.10-1.redhat_00003.1.el6ea
redhat/eap7-jackson-jaxrs-providers<0:2.9.10-1.redhat_00003.1.el6ea
0:2.9.10-1.redhat_00003.1.el6ea
redhat/eap7-jackson-modules-base<0:2.9.10-2.redhat_00003.1.el6ea
0:2.9.10-2.redhat_00003.1.el6ea
redhat/eap7-jackson-modules-java8<0:2.9.10-1.redhat_00003.1.el6ea
0:2.9.10-1.redhat_00003.1.el6ea
redhat/eap7-jberet<0:1.3.5-1.Final_redhat_00001.1.el6ea
0:1.3.5-1.Final_redhat_00001.1.el6ea
redhat/eap7-jboss-ejb-client<0:4.0.27-1.Final_redhat_00001.1.el6ea
0:4.0.27-1.Final_redhat_00001.1.el6ea
redhat/eap7-jboss-server-migration<0:1.3.1-7.Final_redhat_00007.1.el6ea
0:1.3.1-7.Final_redhat_00007.1.el6ea
redhat/eap7-jboss-xnio-base<0:3.7.6-3.SP2_redhat_00001.1.el6ea
0:3.7.6-3.SP2_redhat_00001.1.el6ea
redhat/eap7-netty<0:4.1.42-1.Final_redhat_00001.1.el6ea
0:4.1.42-1.Final_redhat_00001.1.el6ea
redhat/eap7-picketlink-bindings<0:2.5.5-21.SP12_redhat_00010.1.el6ea
0:2.5.5-21.SP12_redhat_00010.1.el6ea
redhat/eap7-undertow<0:2.0.28-2.SP1_redhat_00001.1.el6ea
0:2.0.28-2.SP1_redhat_00001.1.el6ea
redhat/eap7-undertow-jastow<0:2.0.8-1.Final_redhat_00001.1.el6ea
0:2.0.8-1.Final_redhat_00001.1.el6ea
redhat/eap7-weld-core<0:3.0.6-3.Final_redhat_00003.1.el6ea
0:3.0.6-3.Final_redhat_00003.1.el6ea
redhat/eap7-wildfly<0:7.2.6-5.GA_redhat_00001.1.el6ea
0:7.2.6-5.GA_redhat_00001.1.el6ea
redhat/eap7-wildfly-http-client<0:1.0.18-2.Final_redhat_00001.1.el6ea
0:1.0.18-2.Final_redhat_00001.1.el6ea
redhat/eap7-wildfly-transaction-client<0:1.1.8-1.Final_redhat_00001.1.el6ea
0:1.1.8-1.Final_redhat_00001.1.el6ea
redhat/eap7-apache-cxf<0:3.2.11-1.redhat_00001.1.el7ea
0:3.2.11-1.redhat_00001.1.el7ea
redhat/eap7-glassfish-jsf<0:2.3.5-6.SP3_redhat_00004.1.el7ea
0:2.3.5-6.SP3_redhat_00004.1.el7ea
redhat/eap7-hal-console<0:3.0.19-1.Final_redhat_00001.1.el7ea
0:3.0.19-1.Final_redhat_00001.1.el7ea
redhat/eap7-hibernate<0:5.3.14-1.Final_redhat_00001.1.el7ea
0:5.3.14-1.Final_redhat_00001.1.el7ea
redhat/eap7-hibernate-validator<0:6.0.18-1.Final_redhat_00001.1.el7ea
0:6.0.18-1.Final_redhat_00001.1.el7ea
redhat/eap7-jackson-annotations<0:2.9.10-1.redhat_00003.1.el7ea
0:2.9.10-1.redhat_00003.1.el7ea
redhat/eap7-jackson-core<0:2.9.10-1.redhat_00003.1.el7ea
0:2.9.10-1.redhat_00003.1.el7ea
redhat/eap7-jackson-databind<0:2.9.10.1-1.redhat_00001.1.el7ea
0:2.9.10.1-1.redhat_00001.1.el7ea
redhat/eap7-jackson-dataformats-binary<0:2.9.10-1.redhat_00003.1.el7ea
0:2.9.10-1.redhat_00003.1.el7ea
redhat/eap7-jackson-dataformats-text<0:2.9.10-1.redhat_00003.1.el7ea
0:2.9.10-1.redhat_00003.1.el7ea
redhat/eap7-jackson-jaxrs-providers<0:2.9.10-1.redhat_00003.1.el7ea
0:2.9.10-1.redhat_00003.1.el7ea
redhat/eap7-jackson-modules-base<0:2.9.10-2.redhat_00003.1.el7ea
0:2.9.10-2.redhat_00003.1.el7ea
redhat/eap7-jackson-modules-java8<0:2.9.10-1.redhat_00003.1.el7ea
0:2.9.10-1.redhat_00003.1.el7ea
redhat/eap7-jberet<0:1.3.5-1.Final_redhat_00001.1.el7ea
0:1.3.5-1.Final_redhat_00001.1.el7ea
redhat/eap7-jboss-ejb-client<0:4.0.27-1.Final_redhat_00001.1.el7ea
0:4.0.27-1.Final_redhat_00001.1.el7ea
redhat/eap7-jboss-server-migration<0:1.3.1-7.Final_redhat_00007.1.el7ea
0:1.3.1-7.Final_redhat_00007.1.el7ea
redhat/eap7-jboss-xnio-base<0:3.7.6-3.SP2_redhat_00001.1.el7ea
0:3.7.6-3.SP2_redhat_00001.1.el7ea
redhat/eap7-netty<0:4.1.42-1.Final_redhat_00001.1.el7ea
0:4.1.42-1.Final_redhat_00001.1.el7ea
redhat/eap7-picketlink-bindings<0:2.5.5-21.SP12_redhat_00010.1.el7ea
0:2.5.5-21.SP12_redhat_00010.1.el7ea
redhat/eap7-undertow<0:2.0.28-2.SP1_redhat_00001.1.el7ea
0:2.0.28-2.SP1_redhat_00001.1.el7ea
redhat/eap7-undertow-jastow<0:2.0.8-1.Final_redhat_00001.1.el7ea
0:2.0.8-1.Final_redhat_00001.1.el7ea
redhat/eap7-weld-core<0:3.0.6-3.Final_redhat_00003.1.el7ea
0:3.0.6-3.Final_redhat_00003.1.el7ea
redhat/eap7-wildfly<0:7.2.6-5.GA_redhat_00001.1.el7ea
0:7.2.6-5.GA_redhat_00001.1.el7ea
redhat/eap7-wildfly-http-client<0:1.0.18-2.Final_redhat_00001.1.el7ea
0:1.0.18-2.Final_redhat_00001.1.el7ea
redhat/eap7-wildfly-transaction-client<0:1.1.8-1.Final_redhat_00001.1.el7ea
0:1.1.8-1.Final_redhat_00001.1.el7ea
redhat/eap7-apache-cxf<0:3.2.11-1.redhat_00001.1.el8ea
0:3.2.11-1.redhat_00001.1.el8ea
redhat/eap7-glassfish-jsf<0:2.3.5-6.SP3_redhat_00004.1.el8ea
0:2.3.5-6.SP3_redhat_00004.1.el8ea
redhat/eap7-hal-console<0:3.0.19-1.Final_redhat_00001.1.el8ea
0:3.0.19-1.Final_redhat_00001.1.el8ea
redhat/eap7-hibernate<0:5.3.14-1.Final_redhat_00001.1.el8ea
0:5.3.14-1.Final_redhat_00001.1.el8ea
redhat/eap7-hibernate-validator<0:6.0.18-1.Final_redhat_00001.1.el8ea
0:6.0.18-1.Final_redhat_00001.1.el8ea
redhat/eap7-jackson-annotations<0:2.9.10-1.redhat_00003.1.el8ea
0:2.9.10-1.redhat_00003.1.el8ea
redhat/eap7-jackson-core<0:2.9.10-1.redhat_00003.1.el8ea
0:2.9.10-1.redhat_00003.1.el8ea
redhat/eap7-jackson-databind<0:2.9.10.1-1.redhat_00001.1.el8ea
0:2.9.10.1-1.redhat_00001.1.el8ea
redhat/eap7-jackson-dataformats-binary<0:2.9.10-1.redhat_00003.1.el8ea
0:2.9.10-1.redhat_00003.1.el8ea
redhat/eap7-jackson-dataformats-text<0:2.9.10-1.redhat_00003.1.el8ea
0:2.9.10-1.redhat_00003.1.el8ea
redhat/eap7-jackson-jaxrs-providers<0:2.9.10-1.redhat_00003.1.el8ea
0:2.9.10-1.redhat_00003.1.el8ea
redhat/eap7-jackson-modules-base<0:2.9.10-2.redhat_00003.1.el8ea
0:2.9.10-2.redhat_00003.1.el8ea
redhat/eap7-jackson-modules-java8<0:2.9.10-1.redhat_00003.1.el8ea
0:2.9.10-1.redhat_00003.1.el8ea
redhat/eap7-jberet<0:1.3.5-1.Final_redhat_00001.1.el8ea
0:1.3.5-1.Final_redhat_00001.1.el8ea
redhat/eap7-jboss-ejb-client<0:4.0.27-1.Final_redhat_00001.1.el8ea
0:4.0.27-1.Final_redhat_00001.1.el8ea
redhat/eap7-jboss-server-migration<0:1.3.1-7.Final_redhat_00007.1.el8ea
0:1.3.1-7.Final_redhat_00007.1.el8ea
redhat/eap7-jboss-xnio-base<0:3.7.6-3.SP2_redhat_00001.1.el8ea
0:3.7.6-3.SP2_redhat_00001.1.el8ea
redhat/eap7-netty<0:4.1.42-1.Final_redhat_00001.1.el8ea
0:4.1.42-1.Final_redhat_00001.1.el8ea
redhat/eap7-picketlink-bindings<0:2.5.5-21.SP12_redhat_00010.1.el8ea
0:2.5.5-21.SP12_redhat_00010.1.el8ea
redhat/eap7-undertow<0:2.0.28-2.SP1_redhat_00001.1.el8ea
0:2.0.28-2.SP1_redhat_00001.1.el8ea
redhat/eap7-undertow-jastow<0:2.0.8-1.Final_redhat_00001.1.el8ea
0:2.0.8-1.Final_redhat_00001.1.el8ea
redhat/eap7-weld-core<0:3.0.6-3.Final_redhat_00003.1.el8ea
0:3.0.6-3.Final_redhat_00003.1.el8ea
redhat/eap7-wildfly<0:7.2.6-5.GA_redhat_00001.1.el8ea
0:7.2.6-5.GA_redhat_00001.1.el8ea
redhat/eap7-wildfly-http-client<0:1.0.18-2.Final_redhat_00001.1.el8ea
0:1.0.18-2.Final_redhat_00001.1.el8ea
redhat/eap7-wildfly-transaction-client<0:1.1.8-1.Final_redhat_00001.1.el8ea
0:1.1.8-1.Final_redhat_00001.1.el8ea
debian/jackson-databind
2.9.8-3+deb10u3
2.9.8-3+deb10u5
2.12.1-1+deb11u1
2.14.0-1
redhat/jackson-databind<2.9.10
2.9.10
IBM Data Risk Manager<=2.0.6
FasterXML jackson-databind>=2.0.0<2.6.7.3
FasterXML jackson-databind>=2.7.0<2.8.11.5
FasterXML jackson-databind>=2.9.0<2.9.10
Fedora=30
Fedora=31
Debian=8.0
Debian=9.0
Debian=10.0
NetApp OnCommand API Services
NetApp OnCommand Workflow Automation
NetApp SteelStore
redhat jboss enterprise application platform=7.2
redhat jboss enterprise application platform=7.3
Red Hat Enterprise Linux=6.0
Red Hat Enterprise Linux=7.0
Red Hat Enterprise Linux=8.0
oracle banking platform=2.4.0
oracle banking platform=2.4.1
oracle banking platform=2.5.0
oracle banking platform=2.6.0
oracle banking platform=2.6.1
oracle banking platform=2.7.0
oracle banking platform=2.7.1
Oracle Customer Management and Segmentation Foundation=18.0
Oracle Financial Services Analytical Applications Infrastructure>=8.0.2<=8.0.8
oracle global lifecycle management opatch<11.2.0.3.23
oracle global lifecycle management opatch>=12.2.0.1.0<12.2.0.1.19
oracle global lifecycle management opatch>=13.9.4.0.0<13.9.4.2.1
Oracle GoldenGate Application Adapters=19.1.0.0.0
Oracle GoldenGate Stream Analytics<19.1.0.0.1
oracle primavera gateway>=17.7<=17.12
oracle primavera gateway=15.2
oracle primavera gateway=16.1
oracle primavera gateway=16.2
oracle primavera gateway=18.8.0
Oracle Customer Management and Segmentation Foundation=17.0
Oracle Retail Xstore Office Cloud Service=7.1
Oracle Retail Xstore Office Cloud Service=15.0
Oracle Retail Xstore Office Cloud Service=16.0
Oracle Retail Xstore Office Cloud Service=17.0
Oracle Retail Xstore Office Cloud Service=18.0
Oracle WebLogic Server=12.2.1.3.0

Remedy

This vulnerability relies on com.zaxxer.hikari.HikariDataSource being present in the application's ClassPath. Hikari is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use com.zaxxer.hikari are not impacted by this vulnerability. A mitigation to this class of problem in jackson-databind is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2019-16335?

    CVE-2019-16335 has been classified with a high-severity rating due to its potential impact on the integrity of applications using the affected versions of jackson-databind.

  • How do I fix CVE-2019-16335?

    To remediate CVE-2019-16335, upgrade to jackson-databind version 2.6.7.3, 2.8.11.5, or 2.9.10 or later.

  • What systems are affected by CVE-2019-16335?

    CVE-2019-16335 affects various systems utilizing FasterXML jackson-databind versions prior to 2.9.10, including several JBoss and Red Hat products.

  • Is CVE-2019-16335 related to any other vulnerabilities?

    CVE-2019-16335 is related but distinct from CVE-2019-14540, addressing separate issues within the jackson-databind library.

  • Are there specific platforms at risk for CVE-2019-16335?

    Platforms such as Red Hat Enterprise Linux, Fedora, and various JBoss applications are at risk if they run the affected versions of jackson-databind.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203