CVE-2020-11111
Description
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
FasterXML jackson-databind before 2.9.10.4 allows remote code execution via unsafe deserialization using activemq gadgets.
Root
Cause CVE-2020-11111 is a remote code execution vulnerability in FasterXML jackson-databind 2.x prior to version 2.9.10.4 [1]. The flaw stems from improper handling of the interaction between serialization gadgets and the enableDefaultTyping() feature [2]. Specifically, the software fails to block a gadget chain involving classes from the org.apache.activemq package (activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms) [2].
Exploitation
An attacker can exploit this vulnerability by crafting a malicious JSON payload that, when deserialized by an application using a vulnerable version of jackson-databind with default typing enabled, triggers the activemq gadget chain [2]. No authentication is required, and the attack can be delivered over the network. The vulnerability is part of a series of similar issues in jackson-databind arising from incomplete gadget blocking [3].
Impact
Successful exploitation allows an attacker to achieve remote code execution in the context of the application server [2]. This can lead to full system compromise, data theft, or further lateral movement within the network.
Mitigation
The vulnerability is fixed in jackson-databind version 2.9.10.4 [2]. Users should upgrade immediately. If upgrading is not possible, administrators should disable enableDefaultTyping() or properly mask the activemq classes using a custom blocker [3]. The issue was tracked as GitHub issue #2664 in the jackson-databind repository [3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.fasterxml.jackson.core:jackson-databindMaven | >= 2.9.0, < 2.9.10.4 | 2.9.10.4 |
Affected products
4- FasterXML/jackson-databinddescription
- osv-coords3 versionspkg:apk/chainguard/hivepkg:apk/chainguard/hive-compatpkg:maven/com.fasterxml.jackson.core/jackson-databind
< 4.0.1-r1+ 2 more
- (no CPE)range: < 4.0.1-r1
- (no CPE)range: < 4.0.1-r1
- (no CPE)range: >= 2.9.0, < 2.9.10.4
Patches
11d919062ec35[maven-release-plugin] prepare release jackson-databind-2.9.10.4
1 file changed · +2 −2
pom.xml+2 −2 modified@@ -10,7 +10,7 @@ <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> - <version>2.9.10.4-SNAPSHOT</version> + <version>2.9.10.4</version> <name>jackson-databind</name> <packaging>bundle</packaging> <description>General data-binding functionality for Jackson: works on core streaming API</description> @@ -21,7 +21,7 @@ <connection>scm:git:git@github.com:FasterXML/jackson-databind.git</connection> <developerConnection>scm:git:git@github.com:FasterXML/jackson-databind.git</developerConnection> <url>http://github.com/FasterXML/jackson-databind</url> - <tag>HEAD</tag> + <tag>jackson-databind-2.9.10.4</tag> </scm> <properties>
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
12- github.com/advisories/GHSA-v3xw-c963-f5hcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-11111ghsaADVISORY
- github.com/FasterXML/jackson-databind/issues/2664ghsax_refsource_MISCWEB
- lists.debian.org/debian-lts-announce/2020/04/msg00012.htmlghsamailing-listx_refsource_MLISTWEB
- medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062mitrex_refsource_MISC
- medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062ghsaWEB
- security.netapp.com/advisory/ntap-20200403-0002ghsaWEB
- security.netapp.com/advisory/ntap-20200403-0002/mitrex_refsource_CONFIRM
- www.oracle.com/security-alerts/cpujan2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujul2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.