CVE-2019-16942

NameCVE-2019-16942
DescriptionA Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1943-1, DSA-4542-1
NVD severityhigh
Debian Bugs941530

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jackson-databind (PTS)stretch2.8.6-1+deb9u7fixed
stretch (security)2.8.6-1+deb9u6fixed
buster2.9.8-3+deb10u2fixed
buster (security)2.9.8-3+deb10u1fixed
bullseye, sid2.11.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jackson-databindsourcejessie2.4.2-2+deb8u9DLA-1943-1
jackson-databindsourcestretch2.8.6-1+deb9u6DSA-4542-1
jackson-databindsourcebuster2.9.8-3+deb10u1DSA-4542-1
jackson-databindsource(unstable)2.10.0-2941530

Notes

https://github.com/FasterXML/jackson-databind/issues/2478

Search for package or bug name: Reporting problems