Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-12384

Description

FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.

POC

Reference

- https://doyensec.com/research.html

- https://www.oracle.com/security-alerts/cpuapr2020.html

- https://www.oracle.com/security-alerts/cpujan2020.html

- https://www.oracle.com/security-alerts/cpujul2020.html

- https://www.oracle.com/security-alerts/cpuoct2020.html

- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0xT11/CVE-POC

- https://github.com/20142995/sectool

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet

- https://github.com/AnshumanSrivastavaGit/OSCP-3

- https://github.com/BinMarton/openrasp-quick

- https://github.com/BinMarton/quick-openrasp

- https://github.com/BrittanyKuhn/javascript-tutorial

- https://github.com/DennisFeldbusch/HTB_Time_Writeup

- https://github.com/EdgeSecurityTeam/Vulnerability

- https://github.com/Eomoz5620/java-sample

- https://github.com/Eomoz5620/kotlin-sample

- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/Jake-Schoellkopf/Insecure-Java-Deserialization

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/Kmute11/Web_Security_Monitoring

- https://github.com/MagicZer0/Jackson_RCE-CVE-2019-12384

- https://github.com/PalindromeLabs/Java-Deserialization-CVEs

- https://github.com/SexyBeast233/SecBooks

- https://github.com/SugarP1g/LearningSecurity

- https://github.com/Threekiii/Awesome-POC

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/alphaSeclab/sec-daily-2019

- https://github.com/amcai/myscan

- https://github.com/cedelasen/htb-time

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/diakogiannis/moviebook

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/ilmari666/cybsec

- https://github.com/jas502n/CVE-2019-12384

- https://github.com/lnick2023/nicenice

- https://github.com/lokerxx/JavaVul

- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet

- https://github.com/okiemute-esiri/Web_Security_Monitoring

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/rodriguezcappsec/java-vulnerabilities

- https://github.com/seal-community/patches

- https://github.com/shashihacks/OSCP

- https://github.com/shashihacks/OSWE

- https://github.com/snps-steve/generate_csv_reports_for_project_version_enhanced

- https://github.com/tzwlhack/Vulnerability

- https://github.com/xbl3/awesome-cve-poc_qazbnm456