Description
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
Remediation
References
Related Vulnerabilities
WordPress Plugin WordPress Mobile Pack Information Disclosure (2.1.2)
WordPress Plugin WP Offload SES Lite Cross-Site Scripting (1.4.4)
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2009-2901)
Oracle Database Server CVE-2015-0479 Vulnerability (CVE-2015-0479)
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-1159)