mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
31 lines
1.7 KiB
Markdown
31 lines
1.7 KiB
Markdown
![]() |
### [CVE-2019-16942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
|
||
|
- https://www.oracle.com//security-alerts/cpujul2021.html
|
||
|
- https://www.oracle.com/security-alerts/cpuApr2021.html
|
||
|
- https://www.oracle.com/security-alerts/cpuapr2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpujan2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpujul2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpuoct2020.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Live-Hack-CVE/CVE-2019-16942
|
||
|
- https://github.com/OWASP/www-project-ide-vulscanner
|
||
|
- https://github.com/glambert22/movieManager
|
||
|
- https://github.com/ilmari666/cybsec
|
||
|
- https://github.com/kiwitcms/junit-plugin
|
||
|
- https://github.com/seal-community/patches
|
||
|
- https://github.com/yahoo/cubed
|
||
|
|