Search for vulnerabilities
Vulnerability details: VCID-6jz8-wj7d-aaae
Vulnerability ID VCID-6jz8-wj7d-aaae
Aliases CVE-2019-14892
GHSA-cf6r-3wgc-h863
Summary Polymorphic deserialization of malicious object in jackson-databind
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2020:0159
rhas Important https://access.redhat.com/errata/RHSA-2020:0160
rhas Important https://access.redhat.com/errata/RHSA-2020:0161
rhas Important https://access.redhat.com/errata/RHSA-2020:0164
rhas Important https://access.redhat.com/errata/RHSA-2020:0445
rhas Important https://access.redhat.com/errata/RHSA-2020:0729
rhas Moderate https://access.redhat.com/errata/RHSA-2020:0895
rhas Important https://access.redhat.com/errata/RHSA-2020:0899
rhas Important https://access.redhat.com/errata/RHSA-2020:2067
rhas Important https://access.redhat.com/errata/RHSA-2020:2333
rhas Important https://access.redhat.com/errata/RHSA-2020:3192
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14892.json
epss 0.00331 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00331 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00331 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00331 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00392 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00742 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00742 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00742 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00742 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00873 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.00897 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
epss 0.0283 https://api.first.org/data/v1/epss?cve=CVE-2019-14892
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1758171
cvssv3.1 7.5 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892
generic_textual HIGH https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-cf6r-3wgc-h863
cvssv3.1 7.5 https://github.com/FasterXML/jackson-databind
generic_textual HIGH https://github.com/FasterXML/jackson-databind
cvssv3.1 7.5 https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af
generic_textual HIGH https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af
cvssv3.1 7.5 https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b
generic_textual HIGH https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b
cvssv3.1 7.5 https://github.com/FasterXML/jackson-databind/issues/2462
generic_textual HIGH https://github.com/FasterXML/jackson-databind/issues/2462
cvssv3.1 9.8 https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
cvssv3.1 9.8 https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
cvssv3.1 9.8 https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-14892
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2019-14892
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2019-14892
cvssv3.1 7.5 https://security.netapp.com/advisory/ntap-20200904-0005
generic_textual HIGH https://security.netapp.com/advisory/ntap-20200904-0005
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14892.json
https://api.first.org/data/v1/epss?cve=CVE-2019-14892
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14892
https://github.com/FasterXML/jackson-databind
https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af
https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b
https://github.com/FasterXML/jackson-databind/issues/2462
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
https://security.netapp.com/advisory/ntap-20200904-0005
https://security.netapp.com/advisory/ntap-20200904-0005/
1758171 https://bugzilla.redhat.com/show_bug.cgi?id=1758171
cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
CVE-2019-14892 https://nvd.nist.gov/vuln/detail/CVE-2019-14892
GHSA-cf6r-3wgc-h863 https://github.com/advisories/GHSA-cf6r-3wgc-h863
RHSA-2020:0159 https://access.redhat.com/errata/RHSA-2020:0159
RHSA-2020:0160 https://access.redhat.com/errata/RHSA-2020:0160
RHSA-2020:0161 https://access.redhat.com/errata/RHSA-2020:0161
RHSA-2020:0164 https://access.redhat.com/errata/RHSA-2020:0164
RHSA-2020:0445 https://access.redhat.com/errata/RHSA-2020:0445
RHSA-2020:0729 https://access.redhat.com/errata/RHSA-2020:0729
RHSA-2020:0895 https://access.redhat.com/errata/RHSA-2020:0895
RHSA-2020:0899 https://access.redhat.com/errata/RHSA-2020:0899
RHSA-2020:2067 https://access.redhat.com/errata/RHSA-2020:2067
RHSA-2020:2333 https://access.redhat.com/errata/RHSA-2020:2333
RHSA-2020:3192 https://access.redhat.com/errata/RHSA-2020:3192
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14892.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/FasterXML/jackson-databind
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/FasterXML/jackson-databind/issues/2462
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2019-14892
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-14892
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-14892
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20200904-0005
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.70748
EPSS Score 0.00331
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.