Loading
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
Use CWE-200, Fasterxml vendor hub and Jackson-Databind product page to widen CVE-2019-14892 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2020-10650, CVE-2021-20190 and CVE-2020-36183 for nearby disclosures in the same product family.