CVE-2020-11113
📋 TL;DR
This is a deserialization vulnerability in FasterXML jackson-databind that allows remote code execution when processing untrusted JSON content. It affects applications using jackson-databind 2.x before 2.9.10.4 with default polymorphic typing enabled. The vulnerability exploits interaction between serialization gadgets and the openjpa library.
💻 Affected Systems
- FasterXML jackson-databind
- Applications using jackson-databind for JSON processing
- Apache OpenJPA integration
📦 What is this software?
Agile Plm by Oracle
Autovue For Agile Product Lifecycle Management by Oracle
View all CVEs affecting Autovue For Agile Product Lifecycle Management →
Communications Diameter Signaling Router by Oracle
View all CVEs affecting Communications Diameter Signaling Router →
Communications Evolved Communications Application Server by Oracle
View all CVEs affecting Communications Evolved Communications Application Server →
Communications Instant Messaging Server by Oracle
View all CVEs affecting Communications Instant Messaging Server →
Communications Network Charging And Control by Oracle
View all CVEs affecting Communications Network Charging And Control →
Communications Network Charging And Control by Oracle
View all CVEs affecting Communications Network Charging And Control →
Communications Session Report Manager by Oracle
View all CVEs affecting Communications Session Report Manager →
Communications Session Route Manager by Oracle
View all CVEs affecting Communications Session Route Manager →
Enterprise Manager Base Platform by Oracle
Enterprise Manager Base Platform by Oracle
Financial Services Analytical Applications Infrastructure by Oracle
View all CVEs affecting Financial Services Analytical Applications Infrastructure →
Financial Services Institutional Performance Analytics by Oracle
View all CVEs affecting Financial Services Institutional Performance Analytics →
Financial Services Institutional Performance Analytics by Oracle
View all CVEs affecting Financial Services Institutional Performance Analytics →
Financial Services Institutional Performance Analytics by Oracle
View all CVEs affecting Financial Services Institutional Performance Analytics →
Financial Services Price Creation And Discovery by Oracle
View all CVEs affecting Financial Services Price Creation And Discovery →
Financial Services Price Creation And Discovery by Oracle
View all CVEs affecting Financial Services Price Creation And Discovery →
Financial Services Retail Customer Analytics by Oracle
View all CVEs affecting Financial Services Retail Customer Analytics →
Global Lifecycle Management Opatch by Oracle
View all CVEs affecting Global Lifecycle Management Opatch →
Insurance Policy Administration J2ee by Oracle
View all CVEs affecting Insurance Policy Administration J2ee →
Insurance Policy Administration J2ee by Oracle
View all CVEs affecting Insurance Policy Administration J2ee →
Jd Edwards Enterpriseone Orchestrator by Oracle
View all CVEs affecting Jd Edwards Enterpriseone Orchestrator →
⚠️ Risk & Real-World Impact
Worst Case
Remote attacker achieves full system compromise and arbitrary code execution on the vulnerable server.
Likely Case
Remote code execution leading to data theft, system takeover, or lateral movement within the network.
If Mitigated
Denial of service or application crash if exploit fails, but RCE remains primary risk.
🎯 Exploit Status
Exploits require sending specially crafted JSON to vulnerable endpoints. Multiple proof-of-concepts exist in security research.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.9.10.4 or later
Vendor Advisory: https://github.com/FasterXML/jackson-databind/issues/2670
Restart Required: Yes
Instructions:
1. Update jackson-databind dependency to version 2.9.10.4 or later. 2. Update pom.xml or build.gradle to use patched version. 3. Rebuild and redeploy application. 4. Restart affected services.
🔧 Temporary Workarounds
Disable polymorphic typing
allDisable default typing features in ObjectMapper configuration
ObjectMapper mapper = new ObjectMapper();
// Do NOT call mapper.enableDefaultTyping()
Block openjpa classes
allAdd openjpa to the list of blocked deserialization classes
mapper.addMixIn(Object.class, MyMixInForIgnoreType.class);
🧯 If You Can't Patch
- Implement strict input validation and sanitization for all JSON inputs
- Deploy WAF rules to block malicious JSON payloads containing openjpa references
🔍 How to Verify
Check if Vulnerable:
Check pom.xml, build.gradle, or dependency manifest for jackson-databind version <2.9.10.4
Check Version:
mvn dependency:tree | grep jackson-databind OR gradle dependencies | grep jackson-databind
Verify Fix Applied:
Verify jackson-databind version is 2.9.10.4 or higher in dependency files
📡 Detection & Monitoring
Log Indicators:
- Java exceptions mentioning org.apache.openjpa
- Deserialization errors in application logs
- Unexpected class loading attempts
Network Indicators:
- HTTP requests with JSON payloads containing openjpa class references
- Unusual outbound connections from application server
SIEM Query:
source="application.log" AND ("openjpa" OR "deserialization" OR "ClassNotFoundException")
🔗 References
- https://github.com/FasterXML/jackson-databind/issues/2670
- https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html
- https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
- https://security.netapp.com/advisory/ntap-20200403-0002/
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://github.com/FasterXML/jackson-databind/issues/2670
- https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html
- https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
- https://security.netapp.com/advisory/ntap-20200403-0002/
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html