VYPR
High severityNVD Advisory· Published Dec 17, 2020· Updated Aug 4, 2024

CVE-2020-35490

CVE-2020-35490

Description

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

FasterXML jackson-databind before 2.9.10.8 mishandles serialization gadgets with typing, allowing remote code execution via PerUserPoolDataSource from commons-dbcp2.

Vulnerability

Overview

CVE-2020-35490 is a vulnerability in FasterXML jackson-databind versions 2.x before 2.9.10.8. The issue arises from improper handling of the interaction between serialization gadgets and the default typing mechanism. Specifically, the PerUserPoolDataSource class from the Apache Commons DBCP2 library is not blocked by default, enabling exploitation when default typing is enabled [1][2]. The root cause is an incomplete deny list for dangerous gadget classes in the SubTypeValidator class [4].

Exploitation

Exploitation requires that Jackson's default typing is enabled and that an attacker can supply malicious serialized data to a vulnerable application. The attack does not require authentication if the application deserializes untrusted input over a network. The attacker crafts a JSON payload that triggers instantiation of the gadget class, leading to arbitrary code execution [2][3]. The commons-dbcp2 library must be present on the classpath for exploitation to succeed [3].

Impact

Successful exploitation allows an unauthenticated attacker to achieve remote code execution in the context of the application. This can lead to complete compromise of confidentiality, integrity, and availability of the affected system [2]. The vulnerability is similar to other Jackson deserialization issues that leverage gadget chains in common Java libraries.

Mitigation

The vulnerability is fixed in jackson-databind version 2.9.10.8, released on December 2020, which adds PerUserPoolDataSource and SharedPoolDataSource to the list of blocked gadget types [4]. Users are advised to upgrade immediately. If upgrading is not possible, disabling default typing is an effective workaround, though it may impact application functionality [2]. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog at the time of analysis.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.fasterxml.jackson.core:jackson-databindMaven
>= 2.0.0, < 2.9.10.82.9.10.8

Affected products

1

Patches

1
41b8bdb5ccc1

Fixed #2986

https://github.com/FasterXML/jackson-databindTatu SalorantaDec 16, 2020via ghsa
2 files changed · +9 0
  • release-notes/VERSION-2.x+5 0 modified
    @@ -4,6 +4,11 @@ Project: jackson-databind
     === Releases === 
     ------------------------------------------------------------------------
     
    +2.9.10.8 (not yet released)
    +
    +#2986: Block two more gadget types
    + (reported by Al1ex@knownsec)
    +
     2.9.10.7 (02-Dec-2020)
     
     #2589: `DOMDeserializer`: setExpandEntityReferences(false) may not prevent
    
  • src/main/java/com/fasterxml/jackson/databind/jsontype/impl/SubTypeValidator.java+4 0 modified
    @@ -207,6 +207,10 @@ public class SubTypeValidator
             s.add("com.nqadmin.rowset.JdbcRowSetImpl");
             s.add("org.arrah.framework.rdbms.UpdatableJdbcRowsetImpl");
     
    +        // [databind#2986]: dbcp2
    +        s.add("org.apache.commons.dbcp2.datasources.PerUserPoolDataSource");
    +        s.add("org.apache.commons.dbcp2.datasources.SharedPoolDataSource");
    +
             DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s);
         }
     
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

14

News mentions

0

No linked articles in our index yet.