### [CVE-2019-12384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible. ### POC #### Reference - https://doyensec.com/research.html - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpujan2020.html - https://www.oracle.com/security-alerts/cpujul2020.html - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0xT11/CVE-POC - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/AnshumanSrivastavaGit/OSCP-3 - https://github.com/BinMarton/openrasp-quick - https://github.com/BinMarton/quick-openrasp - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/DennisFeldbusch/HTB_Time_Writeup - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/Eomoz5620/java-sample - https://github.com/Eomoz5620/kotlin-sample - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/J1ezds/Vulnerability-Wiki-page - https://github.com/Jake-Schoellkopf/Insecure-Java-Deserialization - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Kmute11/Web_Security_Monitoring - https://github.com/MagicZer0/Jackson_RCE-CVE-2019-12384 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/SexyBeast233/SecBooks - https://github.com/SugarP1g/LearningSecurity - https://github.com/Threekiii/Awesome-POC - https://github.com/XiaomingX/awesome-poc-for-red-team - https://github.com/alphaSeclab/sec-daily-2019 - https://github.com/amcai/myscan - https://github.com/cedelasen/htb-time - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/diakogiannis/moviebook - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/ilmari666/cybsec - https://github.com/jas502n/CVE-2019-12384 - https://github.com/lnick2023/nicenice - https://github.com/lokerxx/JavaVul - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet - https://github.com/okiemute-esiri/Web_Security_Monitoring - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/rodriguezcappsec/java-vulnerabilities - https://github.com/seal-community/patches - https://github.com/shashihacks/OSCP - https://github.com/shashihacks/OSWE - https://github.com/snps-steve/generate_csv_reports_for_project_version_enhanced - https://github.com/tzwlhack/Vulnerability - https://github.com/xbl3/awesome-cve-poc_qazbnm456