Lucene search

K
nvd[email protected]NVD:CVE-2019-16943
HistoryOct 01, 2019 - 5:15 p.m.

CVE-2019-16943

2019-10-0117:15:10
CWE-502
web.nvd.nist.gov

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.8%

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.

Affected configurations

NVD
Node
fasterxmljackson-databindRange2.0.02.6.7.3
OR
fasterxmljackson-databindRange2.7.02.8.11.5
OR
fasterxmljackson-databindRange2.9.02.9.10.1
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
fedoraprojectfedoraMatch30
OR
fedoraprojectfedoraMatch31
Node
redhatjboss_enterprise_application_platformMatch7.2
OR
redhatjboss_enterprise_application_platformMatch7.3
AND
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
Node
redhatjboss_enterprise_application_platformMatch7.2
OR
redhatjboss_enterprise_application_platformMatch7.3
AND
redhatenterprise_linux_serverMatch8.0
Node
oraclebanking_platformMatch2.4.0
OR
oraclebanking_platformMatch2.4.1
OR
oraclebanking_platformMatch2.5.0
OR
oraclebanking_platformMatch2.6.0
OR
oraclebanking_platformMatch2.6.1
OR
oraclebanking_platformMatch2.6.2
OR
oraclebanking_platformMatch2.7.0
OR
oraclebanking_platformMatch2.7.1
OR
oraclebanking_platformMatch2.9.0
OR
oraclecommunications_billing_and_revenue_managementMatch7.5.0.23.0
OR
oraclecommunications_billing_and_revenue_managementMatch12.0.0.3.0
OR
oraclecommunications_calendar_serverMatch8.0.0.2.0
OR
oraclecommunications_calendar_serverMatch8.0.0.3.0
OR
oraclecommunications_cloud_native_core_network_slice_selection_functionMatch1.2.1
OR
oraclecommunications_evolved_communications_application_serverMatch7.1
OR
oracleglobal_lifecycle_management_nextgen_oui_frameworkMatch12.2.1.3.0
OR
oracleglobal_lifecycle_management_nextgen_oui_frameworkMatch12.2.1.4.0
OR
oracleglobal_lifecycle_management_nextgen_oui_frameworkMatch13.9.4.2.2
OR
oraclegoldengate_application_adaptersMatch19.1.0.0.0
OR
oraclejd_edwards_enterpriseone_orchestratorMatch9.2
OR
oraclejd_edwards_enterpriseone_toolsMatch9.2
OR
oracleprimavera_gatewayRange17.717.12.6
OR
oracleprimavera_gatewayRange18.8.018.8.8
OR
oracleprimavera_gatewayMatch16.1
OR
oracleprimavera_gatewayMatch16.2
OR
oracleprimavera_gatewayMatch19.12.0
OR
oracleretail_merchandising_systemMatch15.0.3
OR
oracleretail_merchandising_systemMatch16.0.2
OR
oracleretail_merchandising_systemMatch16.0.3
OR
oracleretail_sales_auditMatch14.1
OR
oraclesiebel_engineering_-_installer_\&_deploymentRange2.20.5
OR
oracletrace_file_analyzerMatch12.2.0.1
OR
oracletrace_file_analyzerMatch18c
OR
oracletrace_file_analyzerMatch19c
OR
oraclewebcenter_portalMatch12.2.1.3.0
OR
oraclewebcenter_portalMatch12.2.1.4.0
OR
oraclewebcenter_sitesMatch12.2.1.3.0
OR
oraclewebcenter_sitesMatch12.2.1.4.0
OR
oracleweblogic_serverMatch12.2.1.3.0
OR
oracleweblogic_serverMatch12.2.1.4.0
Node
netappactive_iq_unified_managerRange7.3linux
OR
netappactive_iq_unified_managerRange7.3windows
OR
netappactive_iq_unified_managerRange9.5vmware_vsphere
OR
netapponcommand_api_servicesMatch-
OR
netapponcommand_workflow_automationMatch-
OR
netappservice_level_managerMatch-
OR
netappsteelstore_cloud_integrated_storageMatch-

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.8%