7.5

CVE-2019-14439

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.

Data is provided by the National Vulnerability Database (NVD)
FasterxmlJackson-databind Version >= 2.0.0 < 2.6.7.3
FasterxmlJackson-databind Version >= 2.7.0 < 2.7.9.6
FasterxmlJackson-databind Version >= 2.8.0 < 2.8.11.4
FasterxmlJackson-databind Version >= 2.9.0 < 2.9.9.2
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
FedoraprojectFedora Version29
FedoraprojectFedora Version30
ApacheDrill Version1.16.0
RedhatJboss Middleware Text-only Advisories Version1.0 SwPlatformmiddleware
OracleBanking Platform Version2.4.0
OracleBanking Platform Version2.4.1
OracleBanking Platform Version2.5.0
OracleBanking Platform Version2.6.0
OracleBanking Platform Version2.6.1
OracleBanking Platform Version2.7.0
OracleBanking Platform Version2.7.1
OracleGlobal Lifecycle Management Opatch Version < 11.2.0.3.23
OracleGlobal Lifecycle Management Opatch Version >= 12.2.0.1.0 < 12.2.0.1.19
OracleGlobal Lifecycle Management Opatch Version >= 13.9.4.0.0 < 13.9.4.2.1
OracleGoldengate Stream Analytics Version < 19.1.0.0.1
OraclePrimavera Gateway Version >= 17.7 <= 17.12
OraclePrimavera Gateway Version15.2
OraclePrimavera Gateway Version16.1
OraclePrimavera Gateway Version16.2
OraclePrimavera Gateway Version18.8.0
OracleSiebel Ui Framework Version <= 19.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 9.41% 0.925
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

https://seclists.org/bugtraq/2019/Oct/6
Third Party Advisory
Mailing List