CVE-2020-36183

📊 8.1 HIGH2.1%🎯 1 exploits
📅 Published Jan 7, 2021
📋 Status: Modified

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.

🎯 Affected Products & Systems

75 product configurations affected

Filter by type:
📱
Vulnerable
Version: ≥ 2.0.0. ∧ < 2.6.7.5
CPE:
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 2.7.0 ∧ < 2.9.10.8
CPE:
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: All versions
CPE:
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
📱
Vulnerable
Version: All versions
CPE:
cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*
💻
Operating System
Vulnerable
Version: 9.0
CPE:
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 9.3.6
CPE:
cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*
Vulnerable
Version: 13.3.0.1
CPE:
cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
Version: 21.0.2
CPE:
cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*
Version: 14.2
CPE:
cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.2:*:*:*:*:*:*:*
Version: 14.3
CPE:
cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.3:*:*:*:*:*:*:*
Version: 14.5
CPE:
cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5:*:*:*:*:*:*:*
Version: 14.2
CPE:
cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.2:*:*:*:*:*:*:*
Version: 14.3
CPE:
cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.3:*:*:*:*:*:*:*
Version: 14.5
CPE:
cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5:*:*:*:*:*:*:*
Vulnerable
Version: 14.2
CPE:
cpe:2.3:a:oracle:banking_extensibility_workbench:14.2:*:*:*:*:*:*:*
Vulnerable
Version: 14.3
CPE:
cpe:2.3:a:oracle:banking_extensibility_workbench:14.3:*:*:*:*:*:*:*
Vulnerable
Version: 14.5
CPE:
cpe:2.3:a:oracle:banking_extensibility_workbench:14.5:*:*:*:*:*:*:*
Vulnerable
Version: 14.2
CPE:
cpe:2.3:a:oracle:banking_supply_chain_finance:14.2:*:*:*:*:*:*:*
Vulnerable
Version: 14.3
CPE:
cpe:2.3:a:oracle:banking_supply_chain_finance:14.3:*:*:*:*:*:*:*
Vulnerable
Version: 14.5
CPE:
cpe:2.3:a:oracle:banking_supply_chain_finance:14.5:*:*:*:*:*:*:*
Vulnerable
Version: 4.4
CPE:
cpe:2.3:a:oracle:banking_treasury_management:4.4:*:*:*:*:*:*:*
Vulnerable
Version: 14.2.0
CPE:
cpe:2.3:a:oracle:banking_virtual_account_management:14.2.0:*:*:*:*:*:*:*
Vulnerable
Version: 14.3.0
CPE:
cpe:2.3:a:oracle:banking_virtual_account_management:14.3.0:*:*:*:*:*:*:*
Vulnerable
Version: 14.5.0
CPE:
cpe:2.3:a:oracle:banking_virtual_account_management:14.5.0:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≤ 21.1.2
CPE:
cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 11.3.0 ∧ ≤ 11.3.2
CPE:
cpe:2.3:a:oracle:commerce_platform:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: 11.2.0
CPE:
cpe:2.3:a:oracle:commerce_platform:11.2.0:*:*:*:*:*:*:*
Version: 7.5.0.23.0
CPE:
cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5.0.23.0:*:*:*:*:*:*:*
Version: 12.0.0.3.0
CPE:
cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*
Version: 1.14.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
Version: 1.4.0
CPE:
cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.4.0:*:*:*:*:*:*:*
Version: 12.0.4.0.0
CPE:
cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.4.0.0:*:*:*:*:*:*:*
Version: ≥ 8.0.0.0 ∧ ≤ 8.5.0.0
CPE:
cpe:2.3:a:oracle:communications_diameter_signaling_route:*:*:*:*:*:*:*:*
Vulnerable
Version: ≥ 8.2.0.0 ∧ ≤ 8.2.4.0
CPE:
cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*
Version: 7.1
CPE:
cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*
Version: 10.0.1.5.0
CPE:
cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*
Version: 12.0.4.0.0
CPE:
cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.4.0.0:*:*:*:*:*:*:*
Version: 12.0.0.3
CPE:
cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3:*:*:*:*:*:*:*
Vulnerable
Version: 12.5.0
CPE:
cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*
Vulnerable
Version: 12.0.0.4.0
CPE:
cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*
Vulnerable
Version: 7.0
CPE:
cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*
Version: ≥ 8.0.0.0 ∧ ≤ 8.2.2.1
CPE:
cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*
Vulnerable
Version: ≥ 8.2.0.0 ∧ ≤ 8.2.2.1
CPE:
cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*
Version: 7.4.1
CPE:
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 12.2.1.4.0
CPE:
cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 12.6.0
CPE:
cpe:2.3:a:oracle:documaker:12.6.0:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 12.6.3
CPE:
cpe:2.3:a:oracle:documaker:12.6.3:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: 12.6.4
CPE:
cpe:2.3:a:oracle:documaker:12.6.4:*:*:*:*:*:*:*
Vulnerable
Version: 19.1.0.0.0
CPE:
cpe:2.3:a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*
Vulnerable
Version: ≥ 11.1.0 ∧ ≤ 11.3.0
CPE:
cpe:2.3:a:oracle:insurance_policy_administration:*:*:*:*:*:*:*:*
Vulnerable
Version: 11.0.2
CPE:
cpe:2.3:a:oracle:insurance_policy_administration:11.0.2:*:*:*:*:*:*:*
Vulnerable
Version: ≥ 11.1.0 ∧ ≤ 11.3.0
CPE:
cpe:2.3:a:oracle:insurance_rules_palette:*:*:*:*:*:*:*:*
Vulnerable
Version: 11.0.2
CPE:
cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*
Version: < 9.2.5.3
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:*:*:*:*:*:*:*:*
Vulnerable
Version: < 9.2.5.3
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.12.0 ∧ ≤ 17.12.11
CPE:
cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 18.8.0 ∧ ≤ 18.8.11
CPE:
cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 19.12.0 ∧ ≤ 19.12.10
CPE:
cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: 20.12.0
CPE:
cpe:2.3:a:oracle:primavera_gateway:20.12.0:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.7 ∧ ≤ 17.12
CPE:
cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: 17.2
CPE:
cpe:2.3:a:oracle:primavera_unifier:17.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 18.8
CPE:
cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*
📱
Vulnerable
Version: 19.12
CPE:
cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*
📱
Vulnerable
Version: 20.12
CPE:
cpe:2.3:a:oracle:primavera_unifier:20.12:*:*:*:*:*:*:*
Version: ≥ 16.0 ∧ ≤ 19.0
CPE:
cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:*:*:*:*:*:*:*:*
Vulnerable
Version: 15.0.3
CPE:
cpe:2.3:a:oracle:retail_merchandising_system:15.0.3:*:*:*:*:*:*:*
Vulnerable
Version: 14.1.3.2
CPE:
cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*
Vulnerable
Version: 15.0.3.1
CPE:
cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*
Vulnerable
Version: 16.0.3.0
CPE:
cpe:2.3:a:oracle:retail_service_backbone:16.0.3.0:*:*:*:*:*:*:*
Vulnerable
Version: 16.0.6
CPE:
cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*
Vulnerable
Version: 17.0.4
CPE:
cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*
Vulnerable
Version: 18.0.3
CPE:
cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*
Vulnerable
Version: 19.0.2
CPE:
cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*
📱
Vulnerable
Version: 12.2.1.3.0
CPE:
cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
📱
Vulnerable
Version: 12.2.1.4.0
CPE:
cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*
75 productsscroll for more
Metrics
8.1 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
HIGH
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Modified
CVSS Details
8.1 (HIGH)v3.1
EPSS Details
2.1% (Minimal)83.4th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
Jan 7, 2021 (4 years ago)
Last Modified
Nov 21, 2024 (11 months ago)
Security Weaknesses1

Available exploits (1)

🔐 Sign-in Required

Sign in to view exploits and proof-of-concept code.

References10