MEDIUM
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
https://access.redhat.com/errata/RHSA-2019:1820
https://access.redhat.com/errata/RHSA-2019:2720
https://access.redhat.com/errata/RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:2935
https://access.redhat.com/errata/RHSA-2019:2936
https://access.redhat.com/errata/RHSA-2019:2937
https://access.redhat.com/errata/RHSA-2019:2938
https://access.redhat.com/errata/RHSA-2019:2998
https://access.redhat.com/errata/RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3200
https://access.redhat.com/errata/RHSA-2019:3292
https://access.redhat.com/errata/RHSA-2019:3297
https://blog.doyensec.com/2019/07/22/jackson-gadgets.html
https://doyensec.com/research.html
https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.struts.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.drill.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cnotifications.geode.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html
https://seclists.org/bugtraq/2019/Oct/6
https://security.netapp.com/advisory/ntap-20190703-0002/
https://www.debian.org/security/2019/dsa-4542
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Source: MITRE
Published: 2019-06-24
Updated: 2019-09-05
Type: CWE-502
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 5.9
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 2.2
Severity: MEDIUM