A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T16:27:25.989Z
Reserved: 2020-03-17T00:00:00.000Z
Link: CVE-2020-10650

No data.

Status : Modified
Published: 2022-12-26T20:15:10.433
Modified: 2024-11-21T04:55:46.330
Link: CVE-2020-10650

No data.