cve/2019/CVE-2019-16942.md

38 lines
2.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-16942](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
### POC
#### Reference
- https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
2024-06-09 00:33:16 +00:00
- https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
2024-05-26 14:27:05 +02:00
- https://www.oracle.com//security-alerts/cpujul2021.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com//security-alerts/cpujul2021.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpuApr2021.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuApr2021.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpuapr2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuapr2020.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpujan2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpujan2020.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpujul2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpujul2020.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Live-Hack-CVE/CVE-2019-16942
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/glambert22/movieManager
- https://github.com/ilmari666/cybsec
- https://github.com/kiwitcms/junit-plugin
- https://github.com/seal-community/patches
- https://github.com/yahoo/cubed