Skip to main content

CVE-2020-14061: n/a in n/a

High
VulnerabilityCVE-2020-14061cvecve-2020-14061
Published: Sun Jun 14 2020 (06/14/2020, 19:42:39 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).

AI-Powered Analysis

AILast updated: 06/25/2025, 17:22:21 UTC

Technical Analysis

CVE-2020-14061 is a security vulnerability affecting the FasterXML jackson-databind library versions 2.x prior to 2.9.10.5. Jackson-databind is a widely used Java library for serializing and deserializing JSON data. The vulnerability arises from improper handling of the interaction between serialization gadgets and typing mechanisms within the library. Specifically, the flaw involves certain Oracle JMS (Java Message Service) classes related to WebLogic and Oracle AQ JMS implementations, including oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory. These classes can be exploited as deserialization gadgets, enabling an attacker to manipulate the deserialization process to execute arbitrary code or cause denial of service. The vulnerability is rooted in the unsafe polymorphic type handling in jackson-databind, which allows attackers to craft malicious JSON payloads that trigger the instantiation of these JMS-related classes during deserialization. This can lead to remote code execution (RCE) or other malicious outcomes if the affected application deserializes untrusted input. Although no known exploits have been reported in the wild, the vulnerability is significant due to the widespread use of jackson-databind in Java applications, especially those integrating with Oracle WebLogic and JMS services. The lack of a CVSS score indicates that the vulnerability has not been formally scored, but the technical details and affected components suggest a serious risk. The issue was addressed in jackson-databind version 2.9.10.5 and later, where stricter controls on allowed types during deserialization were implemented to prevent exploitation via these Oracle JMS classes.

Potential Impact

For European organizations, the impact of CVE-2020-14061 can be substantial, particularly for enterprises relying on Java-based applications that use jackson-databind for JSON processing and integrate with Oracle WebLogic or Oracle AQ JMS messaging services. Successful exploitation could lead to remote code execution, allowing attackers to gain unauthorized access, execute arbitrary commands, or disrupt services. This threatens the confidentiality, integrity, and availability of critical business applications and data. Industries such as finance, telecommunications, manufacturing, and government services in Europe often use Oracle WebLogic and JMS for enterprise messaging and middleware, making them potential targets. Exploitation could result in data breaches, operational downtime, and regulatory non-compliance, especially under GDPR requirements. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits targeting this vulnerability. The complexity of the vulnerability means that only applications deserializing untrusted input without proper validation are at risk, but given the prevalence of jackson-databind, the attack surface is broad. Additionally, the vulnerability could be leveraged as part of multi-stage attacks targeting supply chains or critical infrastructure within Europe.

Mitigation Recommendations

To mitigate CVE-2020-14061, European organizations should: 1) Immediately upgrade jackson-databind to version 2.9.10.5 or later, where the vulnerability is patched. 2) Audit all Java applications to identify usage of jackson-databind, especially those integrating with Oracle WebLogic or JMS components, and ensure they do not deserialize untrusted or unauthenticated input. 3) Implement strict input validation and whitelist allowed classes for polymorphic deserialization using jackson-databind's ObjectMapper configuration (e.g., using enableDefaultTyping with a custom TypeResolverBuilder or using the newer safer polymorphic typing mechanisms). 4) Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) with rules to detect and block suspicious deserialization payloads targeting JMS classes. 5) Monitor application logs and network traffic for anomalous deserialization attempts or unexpected JMS class instantiations. 6) For applications that cannot be immediately updated, consider isolating or sandboxing affected components to limit potential damage. 7) Educate developers and security teams about safe deserialization practices and the risks of using jackson-databind with untrusted data. 8) Review and apply Oracle WebLogic and JMS security advisories to ensure all related components are up to date and hardened.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2020-06-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed04e

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 5:22:21 PM

Last updated: 7/30/2025, 11:18:57 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats