CVE-2020-10650 PUBLISHED

A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.

EPSS 9.85% · 92.9th percentile

Risk Scores

EPSS Score
9.85%
92.9th percentile

Affected Products

VendorProductVersions
Ubuntu:20.04:LTSjackson-databind2.10.0-2, 2.9.9.3-1, 0
Ubuntu:Pro:14.04:LTSjackson-databind0, 2.2.2-1, 2.2.2-1ubuntu0.1~esm1
Ubuntu:24.04:LTSjackson-databind0, 2.14.0-1
AWSconnect
Ubuntu:Pro:16.04:LTSjackson-databind0, 2.4.2-3, 2.4.2-2
Ubuntu:25.10jackson-databind2.14.0+ds-1, 0
Ubuntu:22.04:LTSjackson-databind0, 2.12.1-1, 2.12.5-1
Ubuntu:18.04:LTSjackson-databind2.8.6-1, 2.9.1-1, 2.9.8-1~18.04

Timeline

References

Open in Interactive Console →