The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-11619

CVE-2020-11619: Jackson-databind Deserialization Flaw

CVE-2020-11619 is a deserialization flaw in FasterXML Jackson-databind affecting versions before 2.9.10.4. It exploits serialization gadgets in Spring AOP components. This article covers technical details, impact, and mitigation.

Published: March 4, 2026

CVE-2020-11619 Overview

FasterXML jackson-databind 2.x before version 2.9.10.4 contains an insecure deserialization vulnerability that mishandles the interaction between serialization gadgets and typing. This vulnerability is specifically related to the org.springframework.aop.config.MethodLocatingFactoryBean class (spring-aop), which can be abused as a deserialization gadget when polymorphic type handling is enabled.

When an application uses jackson-databind with default typing enabled, an attacker can craft malicious JSON payloads that exploit the spring-aop gadget chain. Successful exploitation could allow remote attackers to execute arbitrary code on vulnerable systems, potentially leading to complete system compromise.

Critical Impact

Remote code execution through insecure deserialization in jackson-databind when processing untrusted JSON input with polymorphic type handling enabled.

Affected Products

  • FasterXML jackson-databind versions 2.x before 2.9.10.4
  • Debian Linux 8.0
  • NetApp Active IQ Unified Manager (Linux, Windows, VMware vSphere)
  • NetApp SteelStore Cloud Integrated Storage
  • Oracle Agile PLM 9.3.6
  • Oracle Banking Platform
  • Oracle Communications Calendar Server 8.0.0.4.0
  • Oracle Communications Contacts Server 8.0.0.4.0 and 8.0.0.5.0
  • Oracle Communications Diameter Signaling Router
  • Oracle Communications Evolved Communications Application Server 7.1
  • Oracle Communications Instant Messaging Server 10.0.1.4.0
  • Oracle Communications Network Charging and Control
  • Oracle Enterprise Manager Base Platform 13.3.0.0 and 13.4.0.0
  • Oracle Global Lifecycle Management OPatch
  • Oracle JD Edwards EnterpriseOne Orchestrator
  • Oracle JD Edwards EnterpriseOne Tools
  • Oracle Primavera Unifier (multiple versions including 16.1, 16.2, 18.8, 19.12)
  • Oracle Retail Merchandising System 15.0
  • Oracle Retail Sales Audit 14.1
  • Oracle Retail Xstore Point of Service (versions 15.0 through 19.0)
  • Oracle WebLogic Server 12.2.1.3.0 and 12.2.1.4.0

Discovery Timeline

  • April 7, 2020 - CVE-2020-11619 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2020-11619

Vulnerability Analysis

This vulnerability belongs to a class of insecure deserialization flaws that have repeatedly affected jackson-databind. The core issue stems from how jackson-databind handles polymorphic type deserialization when combined with certain "gadget" classes present in application classpaths.

When polymorphic type handling is enabled (via enableDefaultTyping() or @JsonTypeInfo annotations), jackson-databind includes type information in the serialized JSON. During deserialization, the library instantiates objects based on these type hints. If an attacker controls the input JSON, they can specify arbitrary class names that jackson-databind will attempt to instantiate.

The org.springframework.aop.config.MethodLocatingFactoryBean class from spring-aop provides a viable gadget that attackers can leverage to achieve remote code execution. This class, when combined with other Spring components commonly found in enterprise Java applications, creates an exploitable chain.

Root Cause

The root cause is insufficient validation of class types during polymorphic deserialization. Jackson-databind maintains a blocklist of known dangerous classes, but this blocklist must be continuously updated as new gadget chains are discovered. CVE-2020-11619 represents a bypass of existing protections through the newly identified MethodLocatingFactoryBean gadget class.

The vulnerability exists because:

  1. Polymorphic type handling allows untrusted input to specify class types
  2. The spring-aop MethodLocatingFactoryBean class was not included in the gadget blocklist
  3. Applications with spring-aop on the classpath and default typing enabled become vulnerable

Attack Vector

The attack requires the following conditions:

  1. The target application uses a vulnerable version of jackson-databind
  2. Polymorphic type handling is enabled (default typing or @JsonTypeInfo)
  3. The spring-aop library is present on the application's classpath
  4. The application processes attacker-controlled JSON input

An attacker crafts malicious JSON that specifies org.springframework.aop.config.MethodLocatingFactoryBean as the type to instantiate, along with properties that lead to code execution during the deserialization process. When the vulnerable application parses this JSON, it triggers the gadget chain resulting in arbitrary code execution with the privileges of the application.

Detection Methods for CVE-2020-11619

Indicators of Compromise

  • Unusual JSON payloads containing @class or @type fields with org.springframework.aop.config.MethodLocatingFactoryBean
  • Unexpected process spawning from Java application processes
  • Network connections to suspicious external hosts initiated by the Java process
  • Error logs containing deserialization exceptions referencing spring-aop classes

Detection Strategies

  • Implement application-level logging for all deserialization operations and monitor for unusual class instantiation
  • Use Web Application Firewalls (WAF) with rules to detect known jackson-databind gadget class names in JSON payloads
  • Deploy runtime application self-protection (RASP) solutions to monitor deserialization behavior
  • Conduct regular dependency scanning to identify vulnerable jackson-databind versions in your software inventory

Monitoring Recommendations

  • Enable verbose logging for jackson-databind operations in development and staging environments
  • Monitor application memory usage for unusual patterns that may indicate deserialization attacks
  • Track outbound network connections from Java applications to detect potential command-and-control communication
  • Implement centralized log aggregation to correlate potential attack indicators across multiple systems

How to Mitigate CVE-2020-11619

Immediate Actions Required

  • Upgrade jackson-databind to version 2.9.10.4 or later immediately
  • If immediate patching is not possible, disable polymorphic type handling by removing enableDefaultTyping() calls
  • Implement explicit type validation using PolymorphicTypeValidator to restrict allowed classes
  • Remove spring-aop from the classpath if it is not required by the application

Patch Information

FasterXML has released jackson-databind version 2.9.10.4 which adds org.springframework.aop.config.MethodLocatingFactoryBean to the blocklist of classes that cannot be deserialized polymorphically. For more details, see the GitHub Issue Discussion.

Multiple vendors have released patches incorporating the fixed jackson-databind version:

  • Oracle Critical Patch Update July 2020
  • Oracle Critical Patch Update October 2020
  • Oracle Critical Patch Update January 2021
  • NetApp Security Advisory
  • Debian LTS Announcement

Workarounds

  • Disable default typing entirely if polymorphic deserialization is not required for business functionality
  • Use ObjectMapper.activateDefaultTyping() with a custom PolymorphicTypeValidator to whitelist only required classes
  • Apply application-level input validation to reject JSON containing unexpected type indicators
  • Consider using the jackson-databind blacklist feature to manually add suspicious classes if upgrading is delayed
bash
# Maven dependency update example
# Update pom.xml to use patched version:
# <dependency>
#     <groupId>com.fasterxml.jackson.core</groupId>
#     <artifactId>jackson-databind</artifactId>
#     <version>2.9.10.4</version>
# </dependency>

# Gradle dependency update:
# implementation 'com.fasterxml.jackson.core:jackson-databind:2.9.10.4'

# Verify current jackson-databind version in your project:
mvn dependency:tree | grep jackson-databind

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechJackson

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability1.73%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • Apache Geode Mailing List Thread

  • Debian LTS Announcement

  • Medium Jackson CVE Analysis

  • NetApp Security Advisory

  • Oracle Critical Patch Update January 2021

  • Oracle Critical Patch Update July 2020

  • Oracle Critical Patch Update October 2020
  • Vendor Resources
  • GitHub Issue Discussion
  • Related CVEs
  • CVE-2020-9548: Jackson-databind Deserialization Vulnerability

  • CVE-2025-52999: Jackson Core DOS Vulnerability

  • CVE-2025-49128: Jackson-core Information Disclosure Bug

  • CVE-2023-3894: Jackson-dataformats-text DOS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English