{"id":"CVE-2021-20190","details":"A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.","aliases":["BIT-nifi-2021-20190","GHSA-5949-rw7g-wx7w"],"modified":"2026-04-09T07:05:36.757502Z","published":"2021-01-19T17:15:13.427Z","related":["MGASA-2021-0153","SUSE-SU-2021:0243-1","openSUSE-SU-2024:10868-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a%40%3Ccommits.nifi.apache.org%3E"},{"type":"ADVISORY","url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210219-0008/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1916633"},{"type":"FIX","url":"https://github.com/FasterXML/jackson-databind/issues/2854"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/FasterXML/jackson-databind","events":[{"introduced":"0"},{"fixed":"e19c557b789113f900018208d87446c34ae4fab3"},{"introduced":"50791cc7856376949287e0be3e96147665ab8f68"},{"fixed":"d0e9952ea70d1af5c512322a32456f237afb9e9b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.6.7.5"},{"introduced":"2.7.0"},{"fixed":"2.9.10.7"}]}},{"type":"GIT","repo":"https://github.com/apache/nifi","events":[{"introduced":"99bcd1f88dc826f857ae4ab33e842110bfc6ce21"},{"last_affected":"accfaa3034fa5c3ef55d6402ac31e500247100f9"}],"database_specific":{"versions":[{"introduced":"1.7.0"},{"last_affected":"1.12.1"}]}}],"versions":["2.2.0c","2.6.0-rc3b","jackson-databind-2.0.0","jackson-databind-2.0.0-RC1","jackson-databind-2.0.0-RC2","jackson-databind-2.0.0-RC3","jackson-databind-2.0.1","jackson-databind-2.0.2","jackson-databind-2.1.0","jackson-databind-2.1.1","jackson-databind-2.2.0","jackson-databind-2.2.1","jackson-databind-2.2.2","jackson-databind-2.3.0","jackson-databind-2.3.0-rc1","jackson-databind-2.3.1","jackson-databind-2.4.0","jackson-databind-2.4.0-rc1","jackson-databind-2.4.0-rc2","jackson-databind-2.4.0-rc3","jackson-databind-2.4.1","jackson-databind-2.4.1.1","jackson-databind-2.4.1.2","jackson-databind-2.4.1.3","jackson-databind-2.5.0","jackson-databind-2.5.0-rc1","jackson-databind-2.6.0","jackson-databind-2.6.0-rc1","jackson-databind-2.6.0-rc4","jackson-databind-2.6.1","jackson-databind-2.6.2","jackson-databind-2.6.3","jackson-databind-2.6.4","jackson-databind-2.6.5","jackson-databind-2.6.6","jackson-databind-2.6.7","jackson-databind-2.6.7.1","jackson-databind-2.6.7.2","jackson-databind-2.6.7.3","jackson-databind-2.6.7.4","jackson-databind-2.7.0","jackson-databind-2.7.1","jackson-databind-2.7.1-1","jackson-databind-2.8.0","jackson-databind-2.8.1","jackson-databind-2.8.2","jackson-databind-2.9.0","jackson-databind-2.9.0.pr1","jackson-databind-2.9.0.pr2","jackson-databind-2.9.0.pr3","jackson-databind-2.9.0.pr4","jackson-databind-2.9.1","jackson-databind-2.9.10","jackson-databind-2.9.10.1","jackson-databind-2.9.10.2","jackson-databind-2.9.10.3","jackson-databind-2.9.10.4","jackson-databind-2.9.10.5","jackson-databind-2.9.10.6","jackson-databind-2.9.3","jackson-databind-2.9.4","jackson-databind-2.9.5","jackson-databind-2.9.6","jackson-databind-2.9.7","jackson-databind-2.9.8","jackson-databind-2.9.9","jackson-databind-2.9.9.1","jackson-databind-2.9.9.2","jackson-databind-2.9.9.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20190.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.3.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}