
Cloud Vulnerability DB
A community-led vulnerabilities database
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). The vulnerability was discovered and disclosed in March 2020 (CVE Mitre, NVD).
The vulnerability exists in the interaction between serialization gadgets and typing functionality in jackson-databind, specifically related to the ibatis-sqlmap component. This affects versions prior to 2.9.10.4 of the library. The issue involves improper handling of the JtaTransactionConfig class from the com.ibatis.sqlmap.engine.transaction.jta package (GitHub Issue).
When successfully exploited, this vulnerability could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) indicating high severity across confidentiality, integrity and availability impacts (NetApp Advisory).
The primary mitigation is to upgrade jackson-databind to version 2.9.10.4 or later. If immediate upgrade is not possible, it's recommended to disable polymorphic deserialization for untrusted data or implement strict whitelisting of allowed classes. The fix was included in versions 2.9.10.4, 2.8.11.6, and 2.7.9.7 (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."