ID:5072 - Exploit for Deserialization of Untrusted Data in jackson-databind - CVE-2020-24750

 
Main Vulnerability Database Exploits ID:5072 - Exploit for Deserialization of Untrusted Data in jackson-databind - CVE-2020-24750

ID:5072 - Exploit for Deserialization of Untrusted Data in jackson-databind - CVE-2020-24750

Published: January 25, 2021


Vulnerability identifier: #VU47105
Vulnerability risk: High
CVE-ID: CVE-2020-24750
CWE-ID: CWE-502
Exploitation vector: Remote access
Vulnerable software:
jackson-databind

Link to public exploit:


Vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. A remote attacker can execute arbitrary code on the target system.


Remediation

Install update from vendor's website.