Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2019-17531: CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat: CVE-2019-17531: CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
10/12/2019
Created
05/01/2020
Added
04/29/2020
Modified
12/15/2023

Description

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.

Solution(s)

  • redhat-upgrade-apache-commons-collections
  • redhat-upgrade-apache-commons-lang
  • redhat-upgrade-bea-stax-api
  • redhat-upgrade-glassfish-fastinfoset
  • redhat-upgrade-glassfish-jaxb-api
  • redhat-upgrade-glassfish-jaxb-core
  • redhat-upgrade-glassfish-jaxb-runtime
  • redhat-upgrade-glassfish-jaxb-txw2
  • redhat-upgrade-jackson-annotations
  • redhat-upgrade-jackson-core
  • redhat-upgrade-jackson-databind
  • redhat-upgrade-jackson-jaxrs-json-provider
  • redhat-upgrade-jackson-jaxrs-providers
  • redhat-upgrade-jackson-module-jaxb-annotations
  • redhat-upgrade-jakarta-commons-httpclient
  • redhat-upgrade-javassist
  • redhat-upgrade-javassist-javadoc
  • redhat-upgrade-jss
  • redhat-upgrade-jss-debuginfo
  • redhat-upgrade-jss-debugsource
  • redhat-upgrade-jss-javadoc
  • redhat-upgrade-ldapjdk
  • redhat-upgrade-ldapjdk-javadoc
  • redhat-upgrade-pki-base
  • redhat-upgrade-pki-base-java
  • redhat-upgrade-pki-ca
  • redhat-upgrade-pki-core-debuginfo
  • redhat-upgrade-pki-core-debugsource
  • redhat-upgrade-pki-kra
  • redhat-upgrade-pki-server
  • redhat-upgrade-pki-servlet-4-0-api
  • redhat-upgrade-pki-servlet-engine
  • redhat-upgrade-pki-symkey
  • redhat-upgrade-pki-symkey-debuginfo
  • redhat-upgrade-pki-tools
  • redhat-upgrade-pki-tools-debuginfo
  • redhat-upgrade-python-nss-debugsource
  • redhat-upgrade-python-nss-doc
  • redhat-upgrade-python3-nss
  • redhat-upgrade-python3-nss-debuginfo
  • redhat-upgrade-python3-pki
  • redhat-upgrade-relaxngdatatype
  • redhat-upgrade-resteasy
  • redhat-upgrade-slf4j
  • redhat-upgrade-slf4j-jdk14
  • redhat-upgrade-stax-ex
  • redhat-upgrade-tomcatjss
  • redhat-upgrade-velocity
  • redhat-upgrade-xalan-j2
  • redhat-upgrade-xerces-j2
  • redhat-upgrade-xml-commons-apis
  • redhat-upgrade-xml-commons-resolver
  • redhat-upgrade-xmlstreambuffer
  • redhat-upgrade-xsom

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;