{"id":"CVE-2020-24750","details":"FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.","aliases":["GHSA-qjw2-hr98-qgfh"],"modified":"2026-04-09T07:01:27.954694Z","published":"2020-09-17T19:15:13.580Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20201009-0003/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/issues/2798"},{"type":"FIX","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/FasterXML/jackson-databind","events":[{"introduced":"e8df0987e3034d102ee6d704d30a05a2e3ac7089"},{"fixed":"e19c557b789113f900018208d87446c34ae4fab3"},{"introduced":"50791cc7856376949287e0be3e96147665ab8f68"},{"fixed":"f797abcbf63fa4b5faf20a2f567c29d1e513b450"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.6.7.5"},{"introduced":"2.7.0"},{"fixed":"2.9.10.6"}]}},{"type":"GIT","repo":"https://github.com/fasterxml/jackson-databind","events":[{"introduced":"0"},{"fixed":"ad5a630174f08d279504bc51ebba8772fd71b86b"}]}],"versions":["2.2.0c","2.6.0-rc3b","jackson-databind-2.0.0","jackson-databind-2.0.0-RC1","jackson-databind-2.0.0-RC2","jackson-databind-2.0.0-RC3","jackson-databind-2.0.1","jackson-databind-2.0.2","jackson-databind-2.1.0","jackson-databind-2.1.1","jackson-databind-2.2.0","jackson-databind-2.2.1","jackson-databind-2.2.2","jackson-databind-2.3.0","jackson-databind-2.3.0-rc1","jackson-databind-2.3.1","jackson-databind-2.4.0","jackson-databind-2.4.0-rc1","jackson-databind-2.4.0-rc2","jackson-databind-2.4.0-rc3","jackson-databind-2.4.1","jackson-databind-2.4.1.1","jackson-databind-2.4.1.2","jackson-databind-2.4.1.3","jackson-databind-2.5.0","jackson-databind-2.5.0-rc1","jackson-databind-2.6.0","jackson-databind-2.6.0-rc1","jackson-databind-2.6.0-rc4","jackson-databind-2.6.1","jackson-databind-2.6.2","jackson-databind-2.6.3","jackson-databind-2.6.4","jackson-databind-2.6.5","jackson-databind-2.6.6","jackson-databind-2.6.7","jackson-databind-2.6.7.1","jackson-databind-2.6.7.2","jackson-databind-2.6.7.3","jackson-databind-2.6.7.4","jackson-databind-2.7.0","jackson-databind-2.7.0-rc1","jackson-databind-2.7.0-rc2","jackson-databind-2.7.0-rc3","jackson-databind-2.7.1","jackson-databind-2.7.1-1","jackson-databind-2.8.0","jackson-databind-2.8.1","jackson-databind-2.8.2","jackson-databind-2.9.0","jackson-databind-2.9.0.pr1","jackson-databind-2.9.0.pr2","jackson-databind-2.9.0.pr3","jackson-databind-2.9.0.pr4","jackson-databind-2.9.1","jackson-databind-2.9.10","jackson-databind-2.9.10.1","jackson-databind-2.9.10.2","jackson-databind-2.9.10.3","jackson-databind-2.9.10.4","jackson-databind-2.9.10.5","jackson-databind-2.9.10.6","jackson-databind-2.9.3","jackson-databind-2.9.4","jackson-databind-2.9.5","jackson-databind-2.9.6","jackson-databind-2.9.7","jackson-databind-2.9.8","jackson-databind-2.9.9","jackson-databind-2.9.9.1","jackson-databind-2.9.9.2","jackson-databind-2.9.9.3"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.3.6"}]},{"events":[{"introduced":"0"},{"last_affected":"13.3.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"21.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"14.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.2"}]},{"events":[{"introduced":"0"},{"last_affected":"14.3"}]},{"events":[{"introduced":"0"},{"last_affected":"14.5"}]},{"events":[{"introduced":"0"},{"last_affected":"14.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.5.0"}]},{"events":[{"introduced":"0"},{"fixed":"21.1.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0.5.0"}]},{"events":[{"introduced":"8.0.0"},{"last_affected":"8.2.2"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0.1.5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0.0.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"8.0.0.0"},{"last_affected":"8.2.2.1"}]},{"events":[{"introduced":"8.2.0"},{"last_affected":"8.2.2.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.1.5.0"}]},{"events":[{"introduced":"0"},{"last_affected":"21.5"}]},{"events":[{"introduced":"0"},{"last_affected":"21.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24750.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}