mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 18:20:53 +00:00
19 lines
857 B
Markdown
19 lines
857 B
Markdown
![]() |
### [CVE-2020-10650](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10650)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/Live-Hack-CVE/CVE-2020-10650
|
||
|
- https://github.com/seal-community/patches
|
||
|
|