vulnerability
Red Hat JBoss EAP: CVE-2019-12384: Deserialization of Untrusted Data
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Jun 21, 2019 | Sep 19, 2024 | Jul 2, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Jun 21, 2019
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.. A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-502
- CVE-2019-12384
- https://attackerkb.com/topics/CVE-2019-12384
- URL-https://access.redhat.com/security/cve/CVE-2019-12384
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1725807
- URL-https://access.redhat.com/errata/RHSA-2019:2935
- URL-https://access.redhat.com/errata/RHSA-2019:2936
- URL-https://access.redhat.com/errata/RHSA-2019:2937
- URL-https://access.redhat.com/errata/RHSA-2019:2938
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.