该漏洞属于反序列化类型,具体原因是jackson-databind 2.x在2.9.10.4之前的版本中,未能正确处理序列化小工具与类型化之间的交互,特别是与com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig(即ibatis-sqlmap)相关的部分。当启用了多态类型处理(@JsonTypeInfo with use=JsonTypeInfo.Id.CLASS)时,攻击者可以通过反序列化不受信任的数据来执行任意代码。
info: name: FasterXML jackson-databind - Deserialization Remote Code Execution author: pranjalnegi severity: critical description: | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). This vulnerability allows attackers to execute arbitrary code through deserialization of untrusted data when polymorphic type handling (@JsonTypeInfo with use=JsonTypeInfo.Id.CLASS) is enabled. impact: | Successful exploitation could allow an attacker to execute arbitrary code on the affected system through deserialization of malicious JSON payloads. remediation: | Update FasterXML jackson-databind to version 2.9.10.4or later. Alternatively, disable polymorphic type handling or implement proper input validation and deserialization controls. reference: - https://github.com/fairyming/CVE-2020-9547 - https://github.com/FasterXML/jackson-databind/issues/2620 - https://nvd.nist.gov/vuln/detail/CVE-2020-9547 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:9.8 cve-id: CVE-2020-9547 cwe-id: CWE-502 epss-score:0.00943 epss-percentile:0.81205 cpe: cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* metadata: max-request:1 vendor: fasterxml product: jackson-databind shodan-query: cpe:"cpe:2.3:o:debian:debian_linux" verified:true tags: cve,cve2020,jackson,databind,deserialization,rce,kev