Skip to main content

CVE-2020-10673: n/a in n/a

High
VulnerabilityCVE-2020-10673cvecve-2020-10673
Published: Wed Mar 18 2020 (03/18/2020, 21:17:26 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).

AI-Powered Analysis

AILast updated: 07/02/2025, 02:43:30 UTC

Technical Analysis

CVE-2020-10673 is a high-severity vulnerability affecting FasterXML jackson-databind versions 2.x prior to 2.9.10.4. The vulnerability arises from improper handling of serialization gadgets and typing, specifically related to the class com.caucho.config.types.ResourceRef, which is part of the caucho-quercus package. Jackson-databind is a widely used Java library for serializing and deserializing JSON data. The flaw is categorized under CWE-502 (Deserialization of Untrusted Data), indicating that it allows attackers to exploit unsafe deserialization mechanisms. An attacker can craft malicious JSON input that, when deserialized by a vulnerable jackson-databind instance, triggers execution of arbitrary code or causes denial of service by manipulating the ResourceRef class. The CVSS v3.1 score of 8.8 reflects the vulnerability's critical impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is high across all three security properties (C:H/I:H/A:H). Although no known exploits in the wild have been reported, the vulnerability is serious due to the widespread use of jackson-databind in Java applications and frameworks. The lack of a vendor or product name in the record suggests this vulnerability is tied to the jackson-databind library itself rather than a specific product. No official patch links are provided, but the fixed version is known to be 2.9.10.4 or later. Organizations using jackson-databind versions before this should consider immediate upgrades or mitigations.

Potential Impact

For European organizations, the impact of CVE-2020-10673 can be significant due to the extensive use of jackson-databind in enterprise Java applications, including web services, microservices, and backend systems. Successful exploitation can lead to remote code execution, allowing attackers to gain unauthorized access, manipulate sensitive data, disrupt services, or move laterally within networks. This threatens confidentiality, integrity, and availability of critical business systems. Sectors such as finance, healthcare, government, and telecommunications, which rely heavily on Java-based infrastructure, are particularly at risk. The requirement for user interaction (UI:R) may limit automated exploitation but does not eliminate risk, especially in environments where user-triggered deserialization occurs, such as APIs processing JSON payloads from clients. The vulnerability's network attack vector means it can be exploited remotely, increasing the threat surface. Given the high CVSS score and the potential for severe damage, European organizations must prioritize identifying vulnerable jackson-databind versions in their software supply chain and mitigate accordingly to prevent potential breaches or service outages.

Mitigation Recommendations

1. Immediate upgrade of jackson-databind to version 2.9.10.4 or later, where the vulnerability is patched. 2. Conduct a thorough inventory of all applications and services using jackson-databind to identify vulnerable versions. 3. Implement strict input validation and sanitization on JSON inputs, especially those originating from untrusted sources, to reduce the risk of malicious payloads triggering unsafe deserialization. 4. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect and block suspicious deserialization patterns or payloads targeting jackson-databind vulnerabilities. 5. Use Java security manager policies or sandboxing techniques to limit the permissions of applications performing deserialization, minimizing the impact of potential exploitation. 6. Monitor application logs and network traffic for unusual behavior indicative of exploitation attempts, such as unexpected class loading or deserialization errors. 7. Educate developers about secure deserialization practices and encourage the use of safer serialization frameworks or libraries that do not rely on polymorphic typing or that enforce strict type whitelisting. 8. If immediate upgrade is not feasible, consider disabling polymorphic typing features or restricting allowed classes during deserialization as a temporary mitigation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-03-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed044

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 7/2/2025, 2:43:30 AM

Last updated: 8/11/2025, 8:21:50 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats