Skip to content

Commit f7ac313

Browse files
stschottcopernico
authored andcommitted
add fix-commits to 39 jackson-databind CVEs
1 parent d685c51 commit f7ac313

File tree

39 files changed

+207
-0
lines changed

39 files changed

+207
-0
lines changed

statements/CVE-2017-15095/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2017-15095
22
notes:
33
- text: A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: ddfddfba6414adbecaff99684ef66eebd3a92e92
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.8.11
611
reason: Reviewed manually

statements/CVE-2018-14718/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2018-14718
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 87d29af25e82a249ea15858e2d4ecbf64091db44
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2018-14719/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2018-14719
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 87d29af25e82a249ea15858e2d4ecbf64091db44
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2018-14720/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2018-14720
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 87d29af25e82a249ea15858e2d4ecbf64091db44
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2018-14721/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2018-14721
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 87d29af25e82a249ea15858e2d4ecbf64091db44
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2018-19360/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2018-19360
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 72cd4025a229fb28ec133235003dd4616f70afaa
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.5.1
611
reason: Reviewed manually

statements/CVE-2018-19361/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2018-19361
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 72cd4025a229fb28ec133235003dd4616f70afaa
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.8.11
611
reason: Reviewed manually

statements/CVE-2018-19362/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2018-19362
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 72cd4025a229fb28ec133235003dd4616f70afaa
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.8.11
611
reason: Reviewed manually

statements/CVE-2019-12086/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-12086
22
notes:
33
- text: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: dda513bd7251b4f32b7b60b1c13740e3b5a43024
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2019-12384/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-12384
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: c9ef4a10d6f6633cf470d6a469514b68fa2be234
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2019-12814/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-12814
22
notes:
33
- text: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 5f7c69bba07a7155adde130d9dee2e54a54f1fa5
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2019-14379/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-14379
22
notes:
33
- text: SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: ad418eeb974e357f2797aef64aa0e3ffaaa6125b
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2019-14439/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-14439
22
notes:
33
- text: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: ad418eeb974e357f2797aef64aa0e3ffaaa6125b
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2019-14892/statement.yaml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,15 @@
11
vulnerability_id: CVE-2019-14892
22
notes:
33
- text: A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 41b7f9b90149e9d44a65a8261a8deedc7186f6af
8+
repository: https://github.com/FasterXML/jackson-databind
9+
- id: 819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b
10+
repository: https://github.com/FasterXML/jackson-databind
11+
- id: 335db543d45f21ffd0ecf3df8da52eb501a0f087
12+
repository: https://github.com/FasterXML/jackson-databind
413
artifacts:
514
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.8.11
615
reason: Reviewed manually

statements/CVE-2019-14893/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-14893
22
notes:
33
- text: A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 998efd708284778f29d83d7962a9bd935c228317
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.8.11
611
reason: Reviewed manually

statements/CVE-2019-16942/statement.yaml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,15 @@
11
vulnerability_id: CVE-2019-16942
22
notes:
33
- text: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 9593e16cf5a3d289a9c584f7123639655de9ddac
8+
repository: https://github.com/FasterXML/jackson-databind
9+
- id: 328a0f833daf6baa443ac3b37c818a0204714b0b
10+
repository: https://github.com/FasterXML/jackson-databind
11+
- id: 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
12+
repository: https://github.com/FasterXML/jackson-databind
413
artifacts:
514
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
615
reason: Reviewed manually

statements/CVE-2019-16943/statement.yaml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,15 @@
11
vulnerability_id: CVE-2019-16943
22
notes:
33
- text: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 9593e16cf5a3d289a9c584f7123639655de9ddac
8+
repository: https://github.com/FasterXML/jackson-databind
9+
- id: 328a0f833daf6baa443ac3b37c818a0204714b0b
10+
repository: https://github.com/FasterXML/jackson-databind
11+
- id: 54aa38d87dcffa5ccc23e64922e9536c82c1b9c8
12+
repository: https://github.com/FasterXML/jackson-databind
413
artifacts:
514
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
615
reason: Reviewed manually

statements/CVE-2019-17267/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-17267
22
notes:
33
- text: A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 191a4cdf87b56d2ddddb77edd895ee756b7f75eb
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2019-17531/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-17531
22
notes:
33
- text: A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: b5a304a98590b6bb766134f9261e6566dcbbb6d0
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2019-20330/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2019-20330
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: fc4214a883dc087070f25da738ef0d49c2f3387e
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.1.1
611
reason: Reviewed manually

statements/CVE-2020-10650/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-10650
22
notes:
33
- text: ""
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: a424c038ba0c0d65e579e22001dec925902ac0ef
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2020-10672/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-10672
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 592872f4235c7f2a3280725278da55544032f72d
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2020-10968/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-10968
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 05d7e0e13f43e12db6a51726df12c8b4d8040676
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2020-10969/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-10969
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 4d038c9de0aa80a5dae27f552a975cb39cc42b60
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2020-11111/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-11111
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 05d7e0e13f43e12db6a51726df12c8b4d8040676
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2020-11112/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-11112
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 05d7e0e13f43e12db6a51726df12c8b4d8040676
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2020-11113/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-11113
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: e2ba12d5d60715d95105e3e790fc234cfb59893d
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.7.0
611
reason: Reviewed manually

statements/CVE-2020-11619/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-11619
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 113e89fb08b1b6b072d60b3e4737ed407c13db9a
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.9.1
611
reason: Reviewed manually

statements/CVE-2020-11620/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-11620
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 77040d85e3eb6710508e6445640ae1a3d5e60c22
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.9.1
611
reason: Reviewed manually

statements/CVE-2020-14060/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-14060
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: d1c67a0396e84c08d0558fbb843b5bd1f26e1921
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.10.0.pr3
611
reason: Reviewed manually

statements/CVE-2020-14061/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-14061
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 5c8642aeae9c756b438ab7637c90ef3c77966e6e
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.10.0.pr3
611
reason: Reviewed manually

statements/CVE-2020-14062/statement.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
vulnerability_id: CVE-2020-14062
22
notes:
33
- text: FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
4+
fixes:
5+
- id: DEFAULT_BRANCH
6+
commits:
7+
- id: 840eae2ca81c597a0010b2126f32dce17d384b70
8+
repository: https://github.com/FasterXML/jackson-databind
49
artifacts:
510
- id: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.10.0.pr3
611
reason: Reviewed manually

0 commit comments

Comments
 (0)