Vulnerability Name: CVE-2020-14062 (CCN-183425) Assigned: 2020-04-29 Published: 2020-04-29 Updated: 2021-11-17 Summary: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). CVSS v3 Severity: 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H )7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-502 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2020-14062 Source: XF Type: UNKNOWNfasterxml-cve202014062-code-exec(183425) Source: CCN Type: jackson-databind GIT RepositoryBlock one more gadget type (jaxp-ri, CVE-2020-14062) #2704 Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/FasterXML/jackson-databind/issues/2704 Source: MLIST Type: Mailing List, Third Party Advisory[debian-lts-announce] 20200701 [SECURITY] [DLA 2270-1] jackson-databind security update Source: MISC Type: Exploit, Technical Description, Third Party Advisoryhttps://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 Source: CONFIRM Type: Third Party Advisoryhttps://security.netapp.com/advisory/ntap-20200702-0003/ Source: CCN Type: IBM Security Bulletin 6251301 (Cloud Pak System)Multiple Vulnerabilities in jackson-databind shipped with IBM Cloud Pak System Source: CCN Type: IBM Security Bulletin 6258285 (Operations Analytics Predictive Insights) Vulnerabilities in Faster-XML jackson databind affects IBM Operations Analytics Predictive Insights (CVE-2019-14060, CVE-2019-14661, CVE-2019-14662) Source: CCN Type: IBM Security Bulletin 6323689 (ICP Discovery)IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in FasterXML jackson-databind Source: CCN Type: IBM Security Bulletin 6324677 (Operations Analytics Predictive Insights)Vulnerabilities in Faster-XML jackson affect IBM Operations Analytics Predictive Insights (CVE-2019-14060, CVE-2019-14661, CVE-2019-14662) Source: CCN Type: IBM Security Bulletin 6324681 (Operations Analytics Predictive Insights)Jackson vulnerabilities affect IBM Operations Analytics Predictive Insights (CVE-2019-14060, CVE-2019-14661, CVE-2019-14662) Source: CCN Type: IBM Security Bulletin 6324683 (Operations Analytics Predictive Insights)Vulnerabilities in Jackson-databind affect IBM Operations Analytics Predictive Insights (CVE-2019-14060, CVE-2019-14661, CVE-2019-14662) Source: CCN Type: IBM Security Bulletin 6324685 (Operations Analytics Predictive Insights)Vulnerabilities in Jackson-databind (excludes most polymorphic typing gadget attacks) affect IBM Operations Analytics Predictive Insights (CVE-2019-14060, CVE-2019-14661, CVE-2019-14662) Source: CCN Type: IBM Security Bulletin 6335281 (Data Risk Manager)IBM Data Risk Manager is affected by multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6347954 (Netcool Operations Insight)Netcool Operations Insight component IBM Network Performance Insight 1.3.1 affected by CVE-2020-14062 Source: CCN Type: IBM Security Bulletin 6367943 (Spectrum Protect Plus)Vulnerabilities in jQuery, Spring, Dom4j, MongoDB, Linux Kernel, Targetcli-fb, Jackson, Node.js, and Apache Commons affect IBM Spectrum Protect Plus Source: CCN Type: IBM Security Bulletin 6378366 (Cognos Business Intelligence)IBM Cognos Business Intelligence has addressed multiple vulnerabilities (Q12021) Source: CCN Type: IBM Security Bulletin 6446143 (Log Analysis)Series of vulnerabilities in FasterXML jackson-databind affect Apache Solr shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6451705 (Cognos Analytics)IBM Cognos Analytics has addressed multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6496727 (Sterling B2B Integrator)Jackson-Databind Vulnerabilities Affect the B2B API of IBM Sterling B2B Integrator Source: CCN Type: IBM Security Bulletin 6525182 (Spectrum Copy Data Management)Vulnerabilities in Jackson, jQuery, and Dom4j affect IBM Spectrum Copy Data Management Source: CCN Type: IBM Security Bulletin 6528214 (Cloud Pak for Multicloud Management)IBM Cloud Pak for Multicloud Management Monitoring has patched several open source dependencies Source: CCN Type: IBM Security Bulletin 6593435 (Process Mining)Vulnerability in jackson-databind affects IBM Process Mining (Multiple CVEs) Source: CCN Type: IBM Security Bulletin 6595755 (Disconnected Log Collector)IBM Disconnected Log Collector is vulnerable to using components with known vulnerabilities Source: CCN Type: IBM Security Bulletin 6597241 (Cognos Analytics)IBM Cognos Analytics has addressed multiple vulnerabilities Source: CCN Type: IBM Security Bulletin 6828455 (z/Transaction Processing Facility)z/Transaction Processing Facility is affected by multiple vulnerabilities in the jackson-databind, jackson-dataformat-xml, jackson-core, slf4j-ext, and cxf-core packages Source: CCN Type: IBM Security Bulletin 6840955 (Log Analysis)Multiple vulnerabilities in Data-Binding for Jackson shipped with IBM Operations Analytics - Log Analysis Source: CCN Type: IBM Security Bulletin 6910171 (Integration Designer)Multiple CVEs affect IBM Integration Designer Source: CCN Type: IBM Security Bulletin 6983482 (Security Verify Governance)IBM Security Verify Governance is vulnerable to a denial of service caused by multiple vulnerabilities. Source: N/A Type: Third Party AdvisoryN/A Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuApr2021.html Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpujan2021.html Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuoct2020.html Source: MISC Type: Third Party Advisoryhttps://www.oracle.com/security-alerts/cpuoct2021.html Vulnerable Configuration: Configuration 1 :cpe:/a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* (Version >= 2.9.0 and < 2.9.10.5)Configuration 2 :cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:* (Version >= 7.3OR cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* (Version >= 7.3 OR cpe:/a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* (Version >= 9.5 OR cpe:/a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:* Configuration 4 :cpe:/a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:* OR cpe:/a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.2.2) OR cpe:/a:oracle:communications_element_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) OR cpe:/a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:* OR cpe:/a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) OR cpe:/a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:* (Version >= 8.2.0 and <= 8.2.2) Configuration CCN 1 :cpe:/a:fasterxml:jackson-databind:2.9.10.4:*:*:*:*:*:*:* AND cpe:/a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.0:*:*:*:*:*:*:* OR cpe:/a:ibm:operations_analytics_predictive_insights:1.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:5.2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.0.1.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.0.1:*:*:*:*:*:*:* OR cpe:/a:ibm:cloud_pak_system:2.3.1.1:*:*:*:*:*:*:* OR cpe:/a:ibm:data_risk_manager:2.0.6:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.0:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.1:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.2:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.3:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.4:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.5:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6:*:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_protect_plus:10.1.6:*:*:*:*:*:*:* OR cpe:/a:ibm:log_analysis:1.3.6.1:*:*:*:*:*:*:* OR cpe:/a:ibm:sterling_b2b_integrator:6.1.0.0:*:*:*:standard:*:*:* OR cpe:/a:ibm:integration_designer:20.0.0.2:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:* OR cpe:/a:ibm:spectrum_copy_data_management:2.2.13:*:*:*:*:*:*:* OR cpe:/a:ibm:cognos_analytics:11.2.1:*:*:*:*:*:*:* OR cpe:/a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
fasterxml jackson-databind *
netapp active iq unified manager *
netapp active iq unified manager *
netapp active iq unified manager *
netapp steelstore cloud integrated storage -
debian debian linux 8.0
oracle agile plm 9.3.6
oracle banking digital experience 18.1
oracle banking digital experience 18.2
oracle banking digital experience 18.3
oracle banking digital experience 19.1
oracle banking digital experience 19.2
oracle banking digital experience 20.1
oracle communications calendar server 8.0.0.4.0
oracle communications contacts server 8.0.0.5.0
oracle communications diameter signaling router *
oracle communications element manager *
oracle communications evolved communications application server 7.1
oracle communications session report manager *
oracle communications session route manager *
fasterxml jackson-databind 2.9.10.4
ibm cognos business intelligence 10.2.2
ibm cognos analytics 11.0
ibm operations analytics predictive insights 1.3.6
ibm spectrum protect plus 10.1.0
ibm sterling b2b integrator 6.0.0.0
ibm sterling b2b integrator 5.2.0.0
ibm sterling b2b integrator 6.0.1.0
ibm cognos analytics 11.1
ibm cloud pak system 2.3.0.1
ibm cloud pak system 2.3.1.1
ibm data risk manager 2.0.6
ibm log analysis 1.3.5.3
ibm log analysis 1.3.6.0
ibm log analysis 1.3.1
ibm log analysis 1.3.2
ibm log analysis 1.3.3
ibm log analysis 1.3.4
ibm log analysis 1.3.5
ibm log analysis 1.3.6
ibm spectrum protect plus 10.1.6
ibm log analysis 1.3.6.1
ibm sterling b2b integrator 6.1.0.0
ibm integration designer 20.0.0.2
ibm cognos analytics 11.2.0
ibm cognos analytics 11.1.7
ibm spectrum copy data management 2.2.13
ibm cognos analytics 11.2.1
ibm security verify governance 10.0