You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /jar/jackson-databind-2.8.6.jar
Dependency Hierarchy:
❌ jackson-databind-2.8.6.jar (Vulnerable Library)
Vulnerability Details
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
Uh oh!
There was an error while loading. Please reload this page.
CVE-2019-14892 - High Severity Vulnerability
General data-binding functionality for Jackson: works on core streaming API
Library home page: http://github.com/FasterXML/jackson
Path to vulnerable library: /jar/jackson-databind-2.8.6.jar
Dependency Hierarchy:
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
Publish Date: 2020-03-02
URL: CVE-2019-14892
Base Score Metrics:
Type: Upgrade version
Release Date: 2020-09-04
Fix Resolution: 2.8.11.5
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: