CVE-2019-17531
📋 TL;DR
This vulnerability allows remote code execution via Java deserialization in Jackson databind when Default Typing is enabled and the apache-log4j-extra library is present. Attackers can exploit JNDI injection to execute arbitrary code on affected systems. Organizations using Jackson databind 2.0.0 through 2.9.10 with vulnerable configurations are at risk.
💻 Affected Systems
- FasterXML jackson-databind
📦 What is this software?
Communications Billing And Revenue Management by Oracle
View all CVEs affecting Communications Billing And Revenue Management →
Communications Billing And Revenue Management by Oracle
View all CVEs affecting Communications Billing And Revenue Management →
Communications Cloud Native Core Network Slice Selection Function by Oracle
View all CVEs affecting Communications Cloud Native Core Network Slice Selection Function →
Communications Evolved Communications Application Server by Oracle
View all CVEs affecting Communications Evolved Communications Application Server →
Global Lifecycle Management Nextgen Oui Framework by Oracle
View all CVEs affecting Global Lifecycle Management Nextgen Oui Framework →
Global Lifecycle Management Nextgen Oui Framework by Oracle
View all CVEs affecting Global Lifecycle Management Nextgen Oui Framework →
Global Lifecycle Management Nextgen Oui Framework by Oracle
View all CVEs affecting Global Lifecycle Management Nextgen Oui Framework →
Jboss Enterprise Application Platform by Redhat
View all CVEs affecting Jboss Enterprise Application Platform →
Jboss Enterprise Application Platform by Redhat
View all CVEs affecting Jboss Enterprise Application Platform →
Jd Edwards Enterpriseone Orchestrator by Oracle
View all CVEs affecting Jd Edwards Enterpriseone Orchestrator →
Siebel Engineering Installer \& Deployment by Oracle
View all CVEs affecting Siebel Engineering Installer \& Deployment →
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to execute arbitrary code, steal data, install malware, or pivot to other systems.
Likely Case
Remote code execution leading to data exfiltration, service disruption, or lateral movement within the network.
If Mitigated
Limited impact with proper network segmentation, minimal privileges, and security controls preventing successful exploitation.
🎯 Exploit Status
Exploitation requires specific configuration conditions but has been weaponized in real attacks
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.9.10.1 or later
Vendor Advisory: https://github.com/FasterXML/jackson-databind/issues/2387
Restart Required: Yes
Instructions:
1. Update jackson-databind to version 2.9.10.1 or later. 2. Remove apache-log4j-extra 1.2.x from classpath if not needed. 3. Restart affected applications.
🔧 Temporary Workarounds
Disable Default Typing
allDisable Default Typing configuration in Jackson databind to prevent polymorphic deserialization
Configure ObjectMapper with disableDefaultTyping() or avoid @JsonTypeInfo annotations
Remove vulnerable dependency
allRemove apache-log4j-extra 1.2.x from classpath if not required
Remove log4j-extras-1.2.x.jar from application classpath
🧯 If You Can't Patch
- Implement strict network controls to block outbound LDAP/RMI connections from affected systems
- Apply the Java property 'com.sun.jndi.ldap.object.trustURLCodebase=false' to disable remote codebase loading
🔍 How to Verify
Check if Vulnerable:
Check application dependencies for jackson-databind versions 2.0.0-2.9.10 and log4j-extras 1.2.x presence
Check Version:
mvn dependency:tree | grep jackson-databind OR gradle dependencies | grep jackson-databind
Verify Fix Applied:
Verify jackson-databind version is 2.9.10.1+ and log4j-extras is removed or updated
📡 Detection & Monitoring
Log Indicators:
- JNDI lookup attempts
- Unexpected class loading
- Deserialization errors
Network Indicators:
- Outbound LDAP/RMI connections to suspicious IPs
- Unusual Java serialization traffic
SIEM Query:
source="application.log" AND ("JNDI" OR "lookup" OR "InitialContext")
🔗 References
- https://access.redhat.com/errata/RHSA-2019:4192
- https://access.redhat.com/errata/RHSA-2020:0159
- https://access.redhat.com/errata/RHSA-2020:0160
- https://access.redhat.com/errata/RHSA-2020:0161
- https://access.redhat.com/errata/RHSA-2020:0164
- https://access.redhat.com/errata/RHSA-2020:0445
- https://github.com/FasterXML/jackson-databind/issues/2498
- https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5%40%3Ccommits.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f%40%3Ccommits.druid.apache.org%3E
- https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html
- https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
- https://security.netapp.com/advisory/ntap-20191024-0005/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://access.redhat.com/errata/RHSA-2019:4192
- https://access.redhat.com/errata/RHSA-2020:0159
- https://access.redhat.com/errata/RHSA-2020:0160
- https://access.redhat.com/errata/RHSA-2020:0161
- https://access.redhat.com/errata/RHSA-2020:0164
- https://access.redhat.com/errata/RHSA-2020:0445
- https://github.com/FasterXML/jackson-databind/issues/2498
- https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5%40%3Ccommits.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f%40%3Ccommits.druid.apache.org%3E
- https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html
- https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
- https://security.netapp.com/advisory/ntap-20191024-0005/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html