-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2020-10650 - High Severity Vulnerability
Vulnerable Library - jackson-databind-2.2.3.jar
A high-performance JSON processor (parser, generator).
Path to dependency file: /json-patch-master/json-patch-master/build.gradle
Path to vulnerable library: /json-patch-master/json-patch-master/build.gradle
Dependency Hierarchy:
- jackson-coreutils-1.6.jar (Root Library)
- ❌ jackson-databind-2.2.3.jar (Vulnerable Library)
Vulnerability Details
A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.
Publish Date: 2022-12-26
URL: CVE-2020-10650
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-rpr3-cw39-3pxh
Release Date: 2022-12-26
Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4
Step up your Open Source Security Game with Mend here