First published: Tue Apr 07 2020(Updated: )
A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven35-jackson-databind | <0:2.7.6-2.10.el7 | 0:2.7.6-2.10.el7 |
redhat/jackson-databind | <2.9.10.4 | 2.9.10.4 |
maven/com.fasterxml.jackson.core:jackson-databind | >=2.9.0<=2.9.10.3 | 2.9.10.4 |
FasterXML jackson-databind | >=2.9.0<2.9.10.4 | |
Debian Debian Linux | =8.0 | |
Netapp Active Iq Unified Manager Linux | >=7.3 | |
Netapp Active Iq Unified Manager Windows | >=7.3 | |
Netapp Active Iq Unified Manager Vmware Vsphere | >=9.5 | |
Netapp Steelstore Cloud Integrated Storage | ||
Oracle Banking Platform | >=2.4.0<=2.9.0 | |
Oracle Communications Contacts Server | =8.0.0.4.0 | |
Oracle Communications Evolved Communications Application Server | =7.1 | |
Oracle Communications Instant Messaging Server | =10.0.1.4.0 | |
Oracle Communications Network Charging And Control | >=12.0.0<=12.0.3 | |
Oracle Communications Network Charging And Control | =6.0.1 | |
Oracle Enterprise Manager Base Platform | =13.3.0.0 | |
Oracle Enterprise Manager Base Platform | =13.4.0.0 | |
Oracle Global Lifecycle Management Opatch | <12.2.0.1.20 | |
Oracle Jd Edwards Enterpriseone Orchestrator | <9.2.4.2 | |
Oracle Jd Edwards Enterpriseone Tools | <9.2.4.2 | |
Oracle Primavera Unifier | >=17.7<=17.12 | |
Oracle Primavera Unifier | =16.1 | |
Oracle Primavera Unifier | =16.2 | |
Oracle Primavera Unifier | =18.8 | |
Oracle Primavera Unifier | =19.12 | |
Oracle Retail Merchandising System | =15.0 | |
Oracle Retail Sales Audit | =14.1 | |
Oracle Retail Xstore Point of Service | =15.0 | |
Oracle Retail Xstore Point of Service | =16.0 | |
Oracle Retail Xstore Point of Service | =17.0 | |
Oracle Retail Xstore Point of Service | =18.0 | |
Oracle Retail Xstore Point of Service | =19.0 | |
Oracle WebLogic Server | =12.2.1.3.0 | |
Oracle WebLogic Server | =12.2.1.4.0 | |
IBM RQM | <=6.0.6.1 | |
IBM RQM | <=6.0.6 | |
IBM ETM | <=7.0.0 | |
IBM RQM | <=6.0.2 | |
IBM EWM | <=7.0 | |
IBM CLM | <=6.0.6.1 | |
IBM CLM | <=6.0.6 | |
IBM ELM | <=7.0 | |
IBM CLM | <=6.0.2 | |
IBM RDNG | <=6.0.2 | |
IBM RDNG | <=6.0.6.1 | |
IBM RDNG | <=6.0.6 | |
IBM DOORS Next | <=7.0 |
The following conditions are needed for an exploit, we recommend avoiding all if possible: * Deserialization from sources you do not control * `enableDefaultTyping()` * `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-11620 is a vulnerability found in jackson-databind 2.x that mishandles the interaction between serialization gadgets and typing.
The severity of CVE-2020-11620 is high, with a severity value of 8.1.
Jackson-databind versions before 2.9.10.4 are affected by CVE-2020-11620.
CVE-2020-11620 poses a threat to data confidentiality and integrity, as well as system availability.
To fix CVE-2020-11620, update your jackson-databind version to 2.9.10.4 or higher.