Service Notices

All Notices > Security Notices > Jackson Databind Remote Code Execution Vulnerability (CVE-2020-8840)

Jackson Databind Remote Code Execution Vulnerability (CVE-2020-8840)

Mar 09, 2020 GMT+08:00

I. Overview

It is disclosed that a deserialization remote code execution vulnerability (CVE-2020-8840) exists in jackson-databind 2.0.0 through 2.9.10.2. FasterXML Jackson is a Java-based data processing tool developed by FasterXML. The jackson-databind is a core component with data-binding functionality. Due to the lack of certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter, attackers can exploit JNDI injections to remotely execute code.

Therefore, we kindly remind jackson-databind users to arrange inspection and implement timely security hardening.

Reference link:

https://github.com/FasterXML/jackson-databind/issues/2620#

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected Versions:

FasterXML jackson-databind 2.0.0 through 2.9.10.2

Secure Versions:

jackson-databind 2.8.11.5 and later 2.8 series

jackson-databind 2.9.10.3 and later 2.9 series

jackson-databind 2.10 series

IV. Vulnerability Inspection and Handling

Vulnerability inspection (if the following three conditions are met, your system is affected by the vulnerability):

a. The jackson-databind version falls into the affected range.

b. enableDefaultTyping() is enabled, which should be disabled by default.

c. The xbean-reflect library is in use.

Vulnerability handling:

This vulnerability has been fixed in the latest official version. If your service version falls into the affected range, upgrade it to the latest secure version.

Download address: https://github.com/FasterXML/jackson-databind/releases

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.