{"id":"CVE-2019-17531","details":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.","aliases":["GHSA-gjmw-vf9h-g25v"],"modified":"2026-04-16T04:34:15.632110099Z","published":"2019-10-12T21:15:08.570Z","related":["ALSA-2020:1644","openSUSE-SU-2024:10868-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5%40%3Ccommits.pulsar.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f%40%3Ccommits.druid.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"},{"type":"WEB","url":"https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4192"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0159"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0445"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0160"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0161"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0164"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191024-0005/"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/issues/2498"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/FasterXML/jackson-databind","events":[{"introduced":"e8df0987e3034d102ee6d704d30a05a2e3ac7089"},{"fixed":"ec1adf8c72625fd51b30105afad7464c4332d542"},{"introduced":"50791cc7856376949287e0be3e96147665ab8f68"},{"fixed":"ba9ac61920a4391568f4959e399a25833eae9cf6"},{"introduced":"e969f0a31b781f5dfb74e16ddd5ee4b4fa36e8d8"},{"fixed":"db82f32714c083da3c31267352f0dcc65fd371f5"},{"introduced":"0"},{"last_affected":"a5807c566af27b184731dd4eb7dfcc420962db32"},{"introduced":"0"},{"last_affected":"7a095bcc66b228ea48e37c57eafd7d78ce5c090c"},{"introduced":"0"},{"last_affected":"9efc4abb22c664c492271bc9907bbfbf4f70889c"},{"introduced":"0"},{"last_affected":"21f90cf247018c1286cc20544029782450dc270a"},{"introduced":"0"},{"last_affected":"060726b011b008496cd8bb0997ee94a6b73530d1"},{"introduced":"0"},{"last_affected":"3739d9dfbf24b6822b90274ba346ad209eb289fd"},{"introduced":"0"},{"last_affected":"50791cc7856376949287e0be3e96147665ab8f68"},{"introduced":"0"},{"last_affected":"ce9dc07af83f77568a613fd45a86f58c93ba1a02"},{"introduced":"0"},{"last_affected":"e969f0a31b781f5dfb74e16ddd5ee4b4fa36e8d8"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.6.7.3"},{"introduced":"2.7.0"},{"fixed":"2.8.11.5"},{"introduced":"2.9.0"},{"fixed":"2.9.10.1"},{"introduced":"0"},{"last_affected":"2.4.0"},{"introduced":"0"},{"last_affected":"2.4.1"},{"introduced":"0"},{"last_affected":"2.5.0"},{"introduced":"0"},{"last_affected":"2.6.0"},{"introduced":"0"},{"last_affected":"2.6.1"},{"introduced":"0"},{"last_affected":"2.6.2"},{"introduced":"0"},{"last_affected":"2.7.0"},{"introduced":"0"},{"last_affected":"2.7.1"},{"introduced":"0"},{"last_affected":"2.9.0"}]}}],"versions":["2.2.0c","2.6.0-rc3b","jackson-databind-2.0.0","jackson-databind-2.0.1","jackson-databind-2.0.2","jackson-databind-2.1.0","jackson-databind-2.1.1","jackson-databind-2.2.0","jackson-databind-2.2.1","jackson-databind-2.2.2","jackson-databind-2.3.0","jackson-databind-2.3.0-rc1","jackson-databind-2.3.1","jackson-databind-2.4.0","jackson-databind-2.4.0-rc1","jackson-databind-2.4.0-rc2","jackson-databind-2.4.0-rc3","jackson-databind-2.4.1","jackson-databind-2.4.1.1","jackson-databind-2.4.1.2","jackson-databind-2.4.1.3","jackson-databind-2.5.0","jackson-databind-2.5.0-rc1","jackson-databind-2.6.0","jackson-databind-2.6.0-rc1","jackson-databind-2.6.0-rc4","jackson-databind-2.6.1","jackson-databind-2.6.2","jackson-databind-2.6.3","jackson-databind-2.6.4","jackson-databind-2.6.5","jackson-databind-2.6.6","jackson-databind-2.6.7","jackson-databind-2.6.7.1","jackson-databind-2.6.7.2","jackson-databind-2.7.0","jackson-databind-2.7.1","jackson-databind-2.7.1-1","jackson-databind-2.8.0","jackson-databind-2.8.1","jackson-databind-2.8.10","jackson-databind-2.8.11","jackson-databind-2.8.11.1","jackson-databind-2.8.11.2","jackson-databind-2.8.11.3","jackson-databind-2.8.11.4","jackson-databind-2.8.2","jackson-databind-2.8.3","jackson-databind-2.8.4","jackson-databind-2.8.5","jackson-databind-2.8.6","jackson-databind-2.8.7","jackson-databind-2.8.8","jackson-databind-2.8.8.1","jackson-databind-2.8.9","jackson-databind-2.9.0","jackson-databind-2.9.1","jackson-databind-2.9.10","jackson-databind-2.9.3","jackson-databind-2.9.4","jackson-databind-2.9.5","jackson-databind-2.9.6","jackson-databind-2.9.7","jackson-databind-2.9.8","jackson-databind-2.9.9","jackson-databind-2.9.9.1","jackson-databind-2.9.9.2","jackson-databind-2.9.9.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5.0.23.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"1.2.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.9.4.2.2"}]},{"events":[{"introduced":"0"},{"last_affected":"19.1.0.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"17.7"},{"last_affected":"17.12.6"}]},{"events":[{"introduced":"18.8.0"},{"last_affected":"18.8.8"}]},{"events":[{"introduced":"0"},{"last_affected":"16.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.2"}]},{"events":[{"introduced":"0"},{"last_affected":"19.12.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1"}]},{"events":[{"introduced":"0"},{"last_affected":"2.20.5"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"18c"}]},{"events":[{"introduced":"0"},{"last_affected":"19c"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-17531.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}