Vulnerability Name: CVE-2019-17531 (CCN-169073) Assigned: 2019-10-12 Published: 2019-10-12 Updated: 2022-10-29 Summary: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. CVSS v3 Severity: 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.1 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H )7.1 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-502 CWE-20 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2019-17531 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:4192 Source: REDHAT Type: Third Party AdvisoryRHSA-2020:0159 Source: REDHAT Type: Third Party AdvisoryRHSA-2020:0160 Source: REDHAT Type: Third Party AdvisoryRHSA-2020:0161 Source: REDHAT Type: Third Party AdvisoryRHSA-2020:0164 Source: REDHAT Type: Third Party AdvisoryRHSA-2020:0445 Source: XF Type: UNKNOWNfasterxml-cve201917531-code-exec(169073) Source: CCN Type: jackson-databind GIT RepositoryBlock one more gadget type (apache-log4j-extras/1.2, CVE-2019-17531) #2498 Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/FasterXML/jackson-databind/issues/2498 Source: MLIST Type: Mailing List, Third Party Advisory[pulsar-commits] 20191127 [GitHub] [pulsar] massakam opened a new pull request #5758: Bump jackson libraries to 2.10.1 Source: MLIST Type: Mailing List, Third Party Advisory[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image Source: MLIST Type: Mailing List, Third Party Advisory[druid-commits] 20200115 [druid] branch 0.17.0 updated: Suppress CVE-2019-20330 for htrace-core-4.0.1 (#9189) (#9191) Source: MLIST Type: Mailing List, Third Party Advisory[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12 Source: MLIST Type: Mailing List, Third Party Advisory[debian-lts-announce] 20191210 [SECURITY] [DLA 2030-1] jackson-databind security update Source: MISC Type: Exploit, Third Party Advisoryhttps://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20191024-0005/ Source: CCN Type: IBM Security Bulletin 1126395 (Watson Discovery)IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in FasterXML jackson-databind Source: CCN Type: IBM Security Bulletin 1137232 (Platform Symphony)Multiple vulnerabilities in jackson-databind affect IBM Platform Symphony and IBM Spectrum Symphony Source: CCN Type: IBM Security Bulletin 2403639 (Network Performance Insight)Vulnerabilities affect IBM Network Performance Insight (CVE-2019-14379, CVE-2019-17531, CVE-2019-14439 and CVE-2019-14540) Source: CCN Type: IBM Security Bulletin 3176397 (Spectrum Protect Plus)Multiple vulnerabilities in FasterXML Jackson-databind affect IBM Spectrum Protect Plus (CVE-2019-16943, CVE-2019-16942, CVE-2019-17531, CVE-2019-17267, CVE-2019-14540, CVE-2019-16335, CVE-2019-14379, CVE-2019-14439) Source: CCN Type: IBM Security Bulletin 6209044 (Global High Availability Mailbox)Multiple security vulnerabilities have been Identified In Jackson Databind library shipped with IBM Global Mailbox Source: CCN Type: IBM Security Bulletin 6209691 (Sterling B2B Integrator)Multiple Security Vulnerabilities in Jackson-databind Affect IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6217807 (Security Identity Governance and Intelligence)IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerabilities Source: CCN Type: IBM Security Bulletin 6243446 (Data Risk Manager)IBM Data Risk Manager is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6255694 (Rational Rhapsody Design Manager)Multiple vulnerabilities affects IBM Jazz Foundation and IBM Engineering products. Source: CCN Type: IBM Security Bulletin 6324739 (Security Guardium Insights)IBM Security Guardium Insights is affected by Components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6410462 (Security Trusteer Mobile SDK)Android Mobile SDK compile builder includes vulnerable components Source: CCN Type: IBM Security Bulletin 6446143 (Log Analysis)Series of vulnerabilities in FasterXML jackson-databind affect Apache Solr shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6496727 (Sterling B2B Integrator)Jackson-Databind Vulnerabilities Affect the B2B API of IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6528214 (Cloud Pak for Multicloud Management)IBM Cloud Pak for Multicloud Management Monitoring has patched several open source dependencies Source: CCN Type: IBM Security Bulletin 6593435 (Process Mining)Vulnerability in jackson-databind affects IBM Process Mining (Multiple CVEs) Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6597241 (Cognos Analytics)IBM Cognos Analytics has addressed multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6828455 (z/Transaction Processing Facility)z/Transaction Processing Facility is affected by multiple vulnerabilities in the jackson-databind, jackson-dataformat-xml, jackson-core, slf4j-ext, and cxf-core packages Source: CCN Type: IBM Security Bulletin 6840955 (Log Analysis)Multiple vulnerabilities in Data-Binding for Jackson shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6910171 (Integration Designer)Multiple CVEs affect IBM Integration Designer Source: CCN Type: IBM Security Bulletin 6983482 (Security Verify Governance)IBM Security Verify Governance is vulnerable to a denial of service caused by multiple vulnerabilities. Source: N/A Type: Patch, Third Party AdvisoryN/A Source: N/A Type: Third Party AdvisoryN/A Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpujan2020.html Source: CCN Type: Oracle CPUJul2020Oracle Critical Patch Update Advisory - July 2020 Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpujul2020.html Source: CCN Type: Oracle CPUOct2020Oracle Critical Patch Update Advisory - October 2020 Source: MISC Type: Patch, Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuoct2020.html Vulnerable Configuration: Configuration 1 :cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.8.0 and < 2.8.11.5)OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.6.0 and < 2.6.7.3) OR cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.9.0 and < 2.9.10.1) Configuration 2 :cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* Configuration 3 :cpe:/a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:* OR cpe:/a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:* Configuration 4 :cpe:/a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_gateway:16.1:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:jd_edwards_enterpriseone_orchestrator:9.2:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:* OR cpe:/a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:* OR cpe:/a:oracle:trace_file_analyzer:19c:*:*:*:*:*:*:* OR cpe:/a:oracle:trace_file_analyzer:18c:*:*:*:*:*:*:* OR cpe:/a:oracle:trace_file_analyzer:12.2.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:global_lifecycle_management_nextgen_oui_framework:13.9.4.2.2:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_merchandising_system:15.0.3:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_merchandising_system:16.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:* OR cpe:/a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:* OR cpe:/a:oracle:siebel_engineering_-_installer_&_deployment:*:*:*:*:*:*:*:* (Version <= 2.20.5) OR cpe:/a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_calendar_server:8.0.0.2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_calendar_server:8.0.0.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:* OR cpe:/a:oracle:global_lifecycle_management_nextgen_oui_framework:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:oracle:global_lifecycle_management_nextgen_oui_framework:12.2.1.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:* OR cpe:/a:oracle:primavera_gateway:*:*:*:*:*:*:*:* (Version >= 17.7 and <= 17.12.6) OR cpe:/a:oracle:primavera_gateway:*:*:*:*:*:*:*:* (Version >= 18.8.0 and <= 18.8.8) OR cpe:/a:oracle:primavera_gateway:19.12.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:* Configuration 5 :cpe:/a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:* OR cpe:/a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1 :cpe:/a:fasterxml:jackson-databind:2.0.0:-:*:*:*:*:*:* OR cpe:/a:fasterxml:jackson-databind:2.9.10:*:*:*:*:*:*:* AND cpe:/a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:platform_symphony:7.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:platform_symphony:7.1.2:*:*:*:*:*:*:* OR cpe:/a:ibm:platform_symphony:7.2.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_discovery:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_discovery:2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:platform_symphony:7.3:*:*:*:*:*:*:* OR cpe:/a:ibm:platform_symphony:7.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.3:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.4:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.5:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.4:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6.2:*:*:*:*:*:*:* OR cpe:/a:ibm:security_guardium_insights:2.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:* OR cpe:/a:ibm:integration_designer:20.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
fasterxml jackson-databind *
fasterxml jackson-databind *
fasterxml jackson-databind *
debian debian linux 8.0
redhat jboss enterprise application platform 7.2
redhat jboss enterprise application platform 7.3
redhat enterprise linux server 7.0
redhat enterprise linux server 6.0
redhat enterprise linux server 8.0
oracle banking platform 2.4.0
oracle jd edwards enterpriseone tools 9.2
oracle banking platform 2.4.1
oracle primavera gateway 16.1
oracle primavera gateway 16.2
oracle banking platform 2.5.0
oracle weblogic server 12.2.1.3.0
oracle webcenter portal 12.2.1.3.0
oracle webcenter sites 12.2.1.3.0
oracle jd edwards enterpriseone orchestrator 9.2
oracle banking platform 2.6.0
oracle banking platform 2.6.1
oracle banking platform 2.6.2
oracle weblogic server 12.2.1.4.0
oracle webcenter sites 12.2.1.4.0
oracle webcenter portal 12.2.1.4.0
oracle communications billing and revenue management 12.0.0.3.0
oracle communications billing and revenue management 7.5.0.23.0
oracle trace file analyzer 19c
oracle trace file analyzer 18c
oracle trace file analyzer 12.2.0.1
oracle global lifecycle management nextgen oui framework 13.9.4.2.2
oracle retail merchandising system 15.0.3
oracle retail merchandising system 16.0.2
oracle retail merchandising system 16.0.3
oracle retail sales audit 14.1
oracle siebel engineering - installer & deployment *
oracle banking platform 2.7.0
oracle banking platform 2.7.1
oracle banking platform 2.9.0
oracle communications calendar server 8.0.0.2.0
oracle communications calendar server 8.0.0.3.0
oracle communications evolved communications application server 7.1
oracle global lifecycle management nextgen oui framework 12.2.1.3.0
oracle global lifecycle management nextgen oui framework 12.2.1.4.0
oracle goldengate application adapters 19.1.0.0.0
oracle primavera gateway *
oracle primavera gateway *
oracle primavera gateway 19.12.0
oracle communications cloud native core network slice selection function 1.2.1
netapp steelstore cloud integrated storage -
netapp oncommand workflow automation -
fasterxml jackson-databind 2.0.0
fasterxml jackson-databind 2.9.10
ibm rational rhapsody design manager 6.0.2
oracle webcenter portal 12.2.1.3.0
ibm spectrum protect plus 10.1.0
ibm platform symphony 7.1.1
ibm platform symphony 7.1.2
ibm platform symphony 7.2.0.2
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm sterling b2b integrator 6.0.1.0
ibm watson discovery 2.0.1
ibm watson discovery 2.0.0
ibm platform symphony 7.3
ibm platform symphony 7.2.1
ibm spectrum protect plus 10.1.5
ibm data risk manager 2.0.1
ibm data risk manager 2.0.2
ibm data risk manager 2.0.3
ibm data risk manager 2.0.4
ibm data risk manager 2.0.5
ibm data risk manager 2.0.6
ibm sterling b2b integrator 6.0.3.1
ibm security identity governance and intelligence 5.2.6
ibm log analysis 1.3.5.3
ibm log analysis 1.3.6.0
ibm log analysis 1.3.1
ibm log analysis 1.3.2
ibm log analysis 1.3.3
ibm log analysis 1.3.4
ibm log analysis 1.3.5
ibm log analysis 1.3.6
ibm data risk manager 2.0.6.1
ibm data risk manager 2.0.6.2
ibm security guardium insights 2.0.1
ibm log analysis 1.3.6.1
ibm sterling b2b integrator 6.1.0.0
ibm integration designer 20.0.0.2
ibm cognos analytics 11.2.0
ibm cognos analytics 11.1.7
ibm cognos analytics 11.2.1
ibm security verify governance 10.0