|Description||A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
|jackson-databind (PTS)||stretch (security), stretch||2.8.6-1+deb9u6||vulnerable|
|buster, buster (security)||2.9.8-3+deb10u1||vulnerable|
The information below is based on the following data on fixed versions.
[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
but still an issue when Default Typing is enabled.