CVE-2020-9546

CVSS V2 Medium 6.8 CVSS V3 Critical 9.8
Description
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
Overview
  • CVE ID
  • CVE-2020-9546
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-03-02T04:15:10
  • Last Modified Date
  • 2021-12-02T21:22:18
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* 1 OR 2.7.0 2.7.9.7
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* 1 OR 2.8.0 2.8.11.6
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* 1 OR 2.9.0 2.9.10.4
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:* 1 OR 7.3
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* 1 OR 7.3
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* 1 OR 9.5
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:banking_platform:*:*:*:*:*:*:*:* 1 OR 2.4.0 2.9.0
cpe:2.3:a:oracle:communications_calendar_server:8.0.0.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_contacts_server:8.0.0.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_contacts_server:8.0.0.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* 1 OR 8.0.0 8.2.2
cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:* 1 OR 8.2.0 8.2.2
cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:* 1 OR 12.0.0 12.0.3
cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:* 1 OR 8.2.0 8.2.2
cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:* 1 OR 8.2.0 8.2.2
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:* 1 OR 8.0.6 8.1.0
cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_price_creation_and_discovery:8.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:financial_services_retail_customer_analytics:8.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:* 1 OR 12.2.0.1.20
cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:* 1 OR 9.2.4.2
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:* 1 OR 9.2.4.2
cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:* 1 OR 17.7 17.12
cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_sales_audit:14.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 Third Party Advisory
https://github.com/FasterXML/jackson-databind/issues/2631 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E Mailing List Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20200904-0006/ Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Patch Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html Patch Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:43:27 Added to TrackCVE
2022-12-04 11:56:56 2020-03-02T04:15Z 2020-03-02T04:15:10 CVE Published Date updated
2022-12-04 11:56:56 2021-12-02T21:22:18 CVE Modified Date updated
2022-12-04 11:56:56 Analyzed Vulnerability Status updated