Lucene search

K
redhatcveRedhat.comRH:CVE-2019-12384
HistoryAug 22, 2021 - 1:11 p.m.

CVE-2019-12384

2021-08-2213:11:23
redhat.com
access.redhat.com
29
vulnerability
polymorphic deserialization
malicious objects
logback-core gadget
remote code execution
mitigation advice

EPSS

0.533

Percentile

97.6%

A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as enableDefaultTyping() or when @JsonTypeInfo is using Id.CLASS or Id.MINIMAL_CLASS or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.

Mitigation

The following conditions are needed for an exploit, we recommend avoiding all if possible:

  • Deserialization from sources you do not control
  • enableDefaultTyping()
  • @JsonTypeInfo using id.CLASSorid.MINIMAL_CLASS`