CVE-2020-36185
Description
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
FasterXML jackson-databind before 2.9.10.8 allows remote code execution via unsafe deserialization when using default typing, exploiting the tomcat-dbcp SharedPoolDataSource gadget.
CVE-2020-36185 is a deserialization vulnerability in FasterXML jackson-databind versions prior to 2.9.10.8. The root cause is the library's mishandling of the interaction between serialization gadgets and typing, specifically failing to block the class org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource from the tomcat-dbcp library. This class can be used as a gadget in a deserialization chain, similar to previously reported issues (CVE-2020-36184) [3].
Exploitation requires that Jackson's default typing mechanism is enabled (e.g., via @JsonTypeInfo or ObjectMapper.enableDefaultTyping()). An attacker can craft a malicious JSON payload that, when deserialized by a vulnerable application, triggers the gadget chain to execute arbitrary code. No authentication is needed if the deserialization endpoint is exposed to untrusted input [3][4].
Successful exploitation leads to remote code execution in the context of the Java application, potentially allowing an attacker to take full control of the affected system. The vulnerability is particularly dangerous because jackson-databind is widely used in enterprise Java applications for JSON processing.
The issue is fixed in jackson-databind version 2.9.10.8, which adds the SharedPoolDataSource class (along with PerUserPoolDataSource) to the default block list of dangerous types [4]. Users should upgrade immediately. As a workaround, disable default typing if it is not required for the application's functionality.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.fasterxml.jackson.core:jackson-databindMaven | >= 2.0.0, < 2.9.10.8 | 2.9.10.8 |
Affected products
2- FasterXML/jackson-databinddescription
Patches
3e19c557b7891[maven-release-plugin] prepare release jackson-databind-2.6.7.5
1 file changed · +2 −2
pom.xml+2 −2 modified@@ -10,7 +10,7 @@ <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> - <version>2.6.7.5-SNAPSHOT</version> + <version>2.6.7.5</version> <name>jackson-databind</name> <packaging>bundle</packaging> <description>General data-binding functionality for Jackson: works on core streaming API</description> @@ -21,7 +21,7 @@ <connection>scm:git:git@github.com:FasterXML/jackson-databind.git</connection> <developerConnection>scm:git:git@github.com:FasterXML/jackson-databind.git</developerConnection> <url>http://github.com/FasterXML/jackson-databind</url> - <tag>HEAD</tag> + <tag>jackson-databind-2.6.7.5</tag> </scm> <properties>
7ae9214c0670[maven-release-plugin] prepare release jackson-databind-2.9.10.8
1 file changed · +2 −2
pom.xml+2 −2 modified@@ -10,7 +10,7 @@ <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> - <version>2.9.10.8-SNAPSHOT</version> + <version>2.9.10.8</version> <name>jackson-databind</name> <packaging>bundle</packaging> <description>General data-binding functionality for Jackson: works on core streaming API</description> @@ -21,7 +21,7 @@ <connection>scm:git:git@github.com:FasterXML/jackson-databind.git</connection> <developerConnection>scm:git:git@github.com:FasterXML/jackson-databind.git</developerConnection> <url>http://github.com/FasterXML/jackson-databind</url> - <tag>HEAD</tag> + <tag>jackson-databind-2.9.10.8</tag> </scm> <properties>
567194c53ae9Fixed #2998
2 files changed · +7 −0
release-notes/VERSION-2.x+2 −0 modified@@ -12,6 +12,8 @@ Project: jackson-databind (reported by Al1ex@knownsec) #2997: Block 2 more gadget types (tomcat/naming-factory-dbcp) (reported by Al1ex@knownsec) +#2998: Block 2 more gadget types (org.apache.tomcat/tomcat-dbcp) + (reported by Al1ex@knownsec) 2.9.10.7 (02-Dec-2020)
src/main/java/com/fasterxml/jackson/databind/jsontype/impl/SubTypeValidator.java+5 −0 modified@@ -221,6 +221,11 @@ public class SubTypeValidator s.add("org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource"); s.add("org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource"); + // [databind#2998]: org.apache.tomcat/tomcat-dbcp (embedded dbcp 2.x) + // (derivative of #2478) + s.add("org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource"); + s.add("org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource"); + DEFAULT_NO_DESER_CLASS_NAMES = Collections.unmodifiableSet(s); }
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
14- github.com/advisories/GHSA-8w26-6f25-cm9xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-36185ghsaADVISORY
- cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062ghsax_refsource_MISCWEB
- github.com/FasterXML/jackson-databind/commit/567194c53ae91f0a14dc27239afb739b1c10448aghsaWEB
- github.com/FasterXML/jackson-databind/issues/2998ghsax_refsource_MISCWEB
- lists.debian.org/debian-lts-announce/2021/04/msg00025.htmlghsamailing-listx_refsource_MLISTWEB
- security.netapp.com/advisory/ntap-20210205-0005ghsaWEB
- security.netapp.com/advisory/ntap-20210205-0005/mitrex_refsource_CONFIRM
- www.oracle.com//security-alerts/cpujul2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuApr2021.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuapr2022.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujan2022.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpujul2022.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.