{"id":"CVE-2020-11619","details":"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).","aliases":["GHSA-27xj-rqx5-2255"],"modified":"2026-04-16T04:31:20.164275786Z","published":"2020-04-07T23:15:12.077Z","related":["CGA-gc25-rccj-j593"],"references":[{"type":"WEB","url":"https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200511-0004/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/issues/2680"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/FasterXML/jackson-databind","events":[{"introduced":"e969f0a31b781f5dfb74e16ddd5ee4b4fa36e8d8"},{"fixed":"1d919062ec351a925a628be2986224383c27f561"},{"introduced":"a5807c566af27b184731dd4eb7dfcc420962db32"},{"last_affected":"e969f0a31b781f5dfb74e16ddd5ee4b4fa36e8d8"}],"database_specific":{"versions":[{"introduced":"2.9.0"},{"fixed":"2.9.10.4"},{"introduced":"2.4.0"},{"last_affected":"2.9.0"}]}}],"versions":["jackson-databind-2.9.0","jackson-databind-2.9.1","jackson-databind-2.9.10","jackson-databind-2.9.10.1","jackson-databind-2.9.10.2","jackson-databind-2.9.10.3","jackson-databind-2.9.3","jackson-databind-2.9.4","jackson-databind-2.9.5","jackson-databind-2.9.6","jackson-databind-2.9.7","jackson-databind-2.9.8","jackson-databind-2.9.9","jackson-databind-2.9.9.1","jackson-databind-2.9.9.2","jackson-databind-2.9.9.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"7.3"}]},{"events":[{"introduced":"7.3"}]},{"events":[{"introduced":"9.5"}]},{"events":[{"introduced":"0"},{"last_affected":"9.3.6"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.5.0"}]},{"events":[{"introduced":"8.0.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0.1.4.0"}]},{"events":[{"introduced":"12.0.0"},{"last_affected":"12.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.3.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.4.0.0"}]},{"events":[{"introduced":"0"},{"fixed":"12.2.0.1.20"}]},{"events":[{"introduced":"0"},{"fixed":"9.2.4.2"}]},{"events":[{"introduced":"0"},{"fixed":"9.2.4.2"}]},{"events":[{"introduced":"17.7"},{"last_affected":"17.12"}]},{"events":[{"introduced":"0"},{"last_affected":"16.1"}]},{"events":[{"introduced":"0"},{"last_affected":"16.2"}]},{"events":[{"introduced":"0"},{"last_affected":"18.8"}]},{"events":[{"introduced":"0"},{"last_affected":"19.12"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0"}]},{"events":[{"introduced":"0"},{"last_affected":"17.0"}]},{"events":[{"introduced":"0"},{"last_affected":"18.0"}]},{"events":[{"introduced":"0"},{"last_affected":"19.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11619.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}