{"id":"CVE-2020-14061","details":"FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).","aliases":["GHSA-c2q3-4qrh-fm48"],"modified":"2026-04-02T04:09:33.456205Z","published":"2020-06-14T20:15:10.027Z","related":["CGA-jfrq-3vrr-687m","MGASA-2021-0153"],"references":[{"type":"WEB","url":"https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200702-0003/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/issues/2698"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fasterxml/jackson-databind","events":[{"introduced":"e969f0a31b781f5dfb74e16ddd5ee4b4fa36e8d8"},{"fixed":"82c84c74e99ab04cd46b5349f24be1c753034ce1"}],"database_specific":{"versions":[{"introduced":"2.9.0"},{"fixed":"2.9.10.5"}]}}],"versions":["jackson-databind-2.10.0","jackson-databind-2.10.0.pr1","jackson-databind-2.10.0.pr2","jackson-databind-2.10.0.pr3","jackson-databind-2.10.1","jackson-databind-2.10.2","jackson-databind-2.10.3","jackson-databind-2.10.4","jackson-databind-2.11.0","jackson-databind-2.11.0.rc1","jackson-databind-2.9.0","jackson-databind-2.9.1","jackson-databind-2.9.10","jackson-databind-2.9.10.1","jackson-databind-2.9.10.2","jackson-databind-2.9.10.3","jackson-databind-2.9.10.4","jackson-databind-2.9.2","jackson-databind-2.9.3","jackson-databind-2.9.4","jackson-databind-2.9.5","jackson-databind-2.9.6","jackson-databind-2.9.7","jackson-databind-2.9.8","jackson-databind-2.9.9","jackson-databind-2.9.9.1","jackson-databind-2.9.9.2","jackson-databind-2.9.9.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"7.3"}]},{"events":[{"introduced":"7.3"}]},{"events":[{"introduced":"9.5"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.3.6"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"18.1"}]},{"events":[{"introduced":"0"},{"last_affected":"18.2"}]},{"events":[{"introduced":"0"},{"last_affected":"18.3"}]},{"events":[{"introduced":"0"},{"last_affected":"19.1"}]},{"events":[{"introduced":"0"},{"last_affected":"19.2"}]},{"events":[{"introduced":"0"},{"last_affected":"20.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.5.0"}]},{"events":[{"introduced":"8.0.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0.1.4.0"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14061.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}