CVE-2019-12086
moderate-risk
Published 2019-05-17
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
Do I need to act?
!
15.5% chance of exploitation in next 30 days
EPSS score — higher than 84% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (3)
References (82)
Third Party Advisory
http://www.securityfocus.com/bid/109227
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2858
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2935
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2936
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2937
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2938
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2998
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3044
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3045
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3046
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3050
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3149
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3200
and 62 more references
48
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
13/34 · Low
Exposure
9/34 · Low