2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-9547" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2020-03-02T04:15:11.017" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T03:26:58.697" ,
"vulnStatus" : "Modified" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap)."
} ,
{
"lang" : "es" ,
"value" : "FasterXML jackson-databind versiones 2.x anteriores a 2.9.10.4, maneja inapropiadamente la interacci\u00f3n entre la serializaci\u00f3n de gadgets y el tipeo, relacionada a com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (tambi\u00e9n se conoce como ibatis-sqlmap)."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 6.8
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-502"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*" ,
2023-09-13 16:00:28 +00:00
"versionStartIncluding" : "2.0.0" ,
2023-04-24 12:24:31 +02:00
"versionEndExcluding" : "2.7.9.7" ,
2023-09-13 16:00:28 +00:00
"matchCriteriaId" : "2F87CF67-6994-43F1-BEC3-DD7D122D0146"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.8.0" ,
"versionEndExcluding" : "2.8.11.6" ,
"matchCriteriaId" : "04F30C23-46F8-4F58-807B-002C5E96B7F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.9.0" ,
"versionEndExcluding" : "2.9.10.4" ,
"matchCriteriaId" : "77F8EDB1-5890-4054-84FF-2034C7D2ED96"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*" ,
"versionStartIncluding" : "7.3" ,
"matchCriteriaId" : "9FBC1BD0-FF12-4691-8751-5F245D991989"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "7.3" ,
"matchCriteriaId" : "BD075607-09B7-493E-8611-66D041FFDA62"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*" ,
"versionStartIncluding" : "9.5" ,
"matchCriteriaId" : "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97994257-C9A4-4491-B362-E8B25B7187AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "2.4.0" ,
"versionEndIncluding" : "2.9.0" ,
"matchCriteriaId" : "5343F8F8-E8B4-49E9-A304-9C8A608B8027"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "113E281E-977E-4195-B131-B7C7A2933B6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "987811D5-DA5E-493D-8709-F9231A84E5F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0DB23B9A-571E-4B77-B432-23F3DC9B67D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.0" ,
"versionEndIncluding" : "12.0.3" ,
"matchCriteriaId" : "2AB443D1-D8E0-4253-9E1C-B62AEBBE582A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ECC00750-1DBF-401F-886E-E0E65A277409"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7582B307-3899-4BBB-B868-BC912A4D0109"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "12.2.0.1.20" ,
"matchCriteriaId" : "A8200D5C-D3C7-4936-84A7-37864DEEC62B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "9.2.4.2" ,
"matchCriteriaId" : "6E46AE88-E9F8-41CB-B15F-12F5127A1E8D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "9.2.4.2" ,
"matchCriteriaId" : "A3D635AE-5E4A-47FB-9FCA-D82D52A61367"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.7" ,
"versionEndIncluding" : "17.12" ,
"matchCriteriaId" : "08FA59A8-6A62-4B33-8952-D6E658F8DAC9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D55A54FD-7DD1-49CD-BE81-0BE73990943C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "82EB08C0-2D46-4635-88DF-E54F6452D3A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "202AD518-2E9B-4062-B063-9858AE1F9CE2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10864586-270E-4ACF-BDCC-ECFCD299305F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11DA6839-849D-4CEF-85F3-38FE75E07183"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BCE78490-A4BE-40BD-8C72-0A4526BBD4A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55AE3629-4A66-49E4-A33D-6D81CC94962F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4CB39A1A-AD29-45DD-9EB5-5E2053A01B9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27C26705-6D1F-4D5E-B64D-B479108154FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F14A818F-AA16-4438-A3E4-E64C9287AC66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://github.com/FasterXML/jackson-databind/issues/2634" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd%40%3Cissues.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1%40%3Cnotifications.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a%40%3Cnotifications.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18%40%3Cnotifications.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1%40%3Cdev.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb%40%3Cissues.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6%40%3Cnotifications.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596%40%3Cissues.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab%40%3Cnotifications.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc%40%3Cdev.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca%40%3Cissues.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6%40%3Cissues.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097%40%3Cissues.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428%40%3Cnotifications.zookeeper.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20200904-0006/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpujan2021.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpujul2020.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuoct2020.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuoct2021.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
}
]
}