vulnerability
Red Hat JBoss EAP: CVE-2019-17531: Deserialization of Untrusted Data
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Oct 12, 2019 | Sep 19, 2024 | Jul 2, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Oct 12, 2019
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-502
- CVE-2019-17531
- https://attackerkb.com/topics/CVE-2019-17531
- URL-https://access.redhat.com/security/cve/CVE-2019-17531
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1775293
- URL-https://access.redhat.com/errata/RHSA-2020:0159
- URL-https://access.redhat.com/errata/RHSA-2020:0160
- URL-https://access.redhat.com/errata/RHSA-2020:0161
- URL-https://access.redhat.com/errata/RHSA-2020:0164
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.