Miggo Logo

CVE-2019-14540: Polymorphic Typing issue in FasterXML jackson-databind

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.91051%
Published
9/23/2019
Updated
3/15/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.fasterxml.jackson.core:jackson-databindmaven>= 2.9.0, < 2.9.102.9.10
com.fasterxml.jackson.core:jackson-databindmaven>= 2.7.0, < 2.8.11.52.8.11.5
com.fasterxml.jackson.core:jackson-databindmaven< 2.6.7.32.6.7.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patches indicate that the vulnerability is related to the deserialization of 'com.zaxxer.hikari.HikariConfig' and its subclasses. The mitigation involves adding these classes to a blacklist, suggesting that the deserialization process is the vulnerable component. The exact function name might vary based on the exact method handling the deserialization check, but it's related to the SubTypeValidator class.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* Polymorp*i* Typin* issu* w*s *is*ov*r** in **st*rXML j**kson-**t**in* ***or* *.*.**, *.*.**.*, *n* *.*.*.*. It is r*l*t** to `*om.z*xx*r.*ik*ri.*ik*ri*on*i*`.

Reasoning

T** p*t***s in*i**t* t**t t** vuln*r**ility is r*l*t** to t** **s*ri*liz*tion o* '*om.z*xx*r.*ik*ri.*ik*ri*on*i*' *n* its su**l*ss*s. T** miti**tion involv*s ***in* t**s* *l*ss*s to * *l**klist, su***stin* t**t t** **s*ri*liz*tion `pro**ss` is t** vu