FasterXML jackson-databind 2.x before 2.9.10.8 mishandles serialization gadgets and typing
Reporter | Title | Published | Views | Family All 56 |
---|---|---|---|---|
![]() | Arbitrary Code Execution | 8 Jan 202106:11 | – | veracode |
![]() | CVE-2020-36184 | 6 Jan 202122:30 | – | cvelist |
![]() | Unsafe Deserialization in jackson-databind | 9 Dec 202119:16 | – | github |
![]() | CVE-2020-36184 | 7 Jan 202120:14 | – | redhatcve |
![]() | Injection com.fasterxml.jackson.core:jackson-databind Dependency in Crowd Data Center and Server | 9 Apr 202401:53 | – | atlassian |
![]() | CVE-2020-36184 | 6 Jan 202123:15 | – | debiancve |
![]() | Design/Logic Flaw | 6 Jan 202123:15 | – | prion |
![]() | CVE-2020-36184 | 6 Jan 202100:00 | – | ubuntucve |
![]() | Unsafe Deserialization in jackson-databind | 9 Dec 202119:16 | – | osv |
![]() | CVE-2020-36184 | 6 Jan 202123:15 | – | osv |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
dataSourceName | query param | /Exploit | Vulnerability in Jackson-databind allows for RCE through crafted input targeting PerUserPoolDataSource. | CWE-502 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo