CVE-2020-24616
📋 TL;DR
This is a deserialization vulnerability in FasterXML jackson-databind that allows remote code execution when processing untrusted JSON data. It affects applications using jackson-databind 2.x before 2.9.10.6 with default polymorphic typing enabled and the Anteros-DBCP library in classpath.
💻 Affected Systems
- FasterXML jackson-databind
- Applications using jackson-databind with Anteros-DBCP
📦 What is this software?
Agile Plm by Oracle
Autovue For Agile Product Lifecycle Management by Oracle
View all CVEs affecting Autovue For Agile Product Lifecycle Management →
Communications Cloud Native Core Unified Data Repository by Oracle
View all CVEs affecting Communications Cloud Native Core Unified Data Repository →
Communications Diameter Signaling Router by Oracle
View all CVEs affecting Communications Diameter Signaling Router →
Communications Evolved Communications Application Server by Oracle
View all CVEs affecting Communications Evolved Communications Application Server →
Communications Instant Messaging Server by Oracle
View all CVEs affecting Communications Instant Messaging Server →
Communications Offline Mediation Controller by Oracle
View all CVEs affecting Communications Offline Mediation Controller →
Communications Policy Management by Oracle
Communications Pricing Design Center by Oracle
View all CVEs affecting Communications Pricing Design Center →
Communications Services Gatekeeper by Oracle
View all CVEs affecting Communications Services Gatekeeper →
Communications Session Report Manager by Oracle
View all CVEs affecting Communications Session Report Manager →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with the privileges of the application, potentially leading to complete system compromise.
Likely Case
Remote code execution allowing attackers to execute arbitrary commands on the server.
If Mitigated
No impact if polymorphic typing is disabled or untrusted data is not processed.
🎯 Exploit Status
Exploitation is straightforward when conditions are met. Multiple public PoCs exist demonstrating RCE.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.9.10.6 or later
Vendor Advisory: https://github.com/FasterXML/jackson-databind/issues/2814
Restart Required: Yes
Instructions:
1. Update jackson-databind to version 2.9.10.6 or later. 2. Update dependencies in your build system (Maven, Gradle, etc.). 3. Rebuild and redeploy your application. 4. Restart affected services.
🔧 Temporary Workarounds
Disable polymorphic typing
allDisable default typing features if not required for your application.
ObjectMapper mapper = new ObjectMapper(); // Do NOT call enableDefaultTyping()
Block Anteros-DBCP class
allAdd AnterosDBCPDataSource to the default deny list in jackson-databind.
System.setProperty("com.fasterxml.jackson.databind.type.mapping", "br.com.anteros.dbcp.AnterosDBCPDataSource")
🧯 If You Can't Patch
- Disable polymorphic typing in ObjectMapper configuration
- Implement input validation and sanitization for all JSON inputs
🔍 How to Verify
Check if Vulnerable:
Check your project's dependency tree for jackson-databind versions before 2.9.10.6 and presence of Anteros-DBCP library.
Check Version:
mvn dependency:tree | grep jackson-databind OR gradle dependencies | grep jackson-databind
Verify Fix Applied:
Verify jackson-databind version is 2.9.10.6 or later in your dependencies and no vulnerable configurations exist.
📡 Detection & Monitoring
Log Indicators:
- Unexpected deserialization errors
- ClassNotFoundExceptions for AnterosDBCPDataSource
- Unusual process spawning
Network Indicators:
- Malformed JSON payloads containing serialized gadget chains
- Unexpected outbound connections from application
SIEM Query:
source="application.logs" AND ("AnterosDBCPDataSource" OR "jackson.databind" AND error)
🔗 References
- https://github.com/FasterXML/jackson-databind/issues/2814
- https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html
- https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
- https://security.netapp.com/advisory/ntap-20200904-0006/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://github.com/FasterXML/jackson-databind/issues/2814
- https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html
- https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
- https://security.netapp.com/advisory/ntap-20200904-0006/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html