A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "2.9.10.4"
},
{
"introduced": "0"
},
{
"last_affected": "2.10.0-prerelease1"
},
{
"introduced": "0"
},
{
"last_affected": "2.10.0-prerelease2"
},
{
"introduced": "0"
},
{
"last_affected": "2.10.0-prerelease3"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.1"
}
]
}
]
[
{
"id": "CVE-2020-10650-6337678c",
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"line_hashes": [
"311011731225915116545711491906524693495",
"289935091089819332343959279013463516415",
"60425283607129911915602887277191298174"
],
"threshold": 0.9
},
"source": "https://github.com/fasterxml/jackson-databind/commit/a424c038ba0c0d65e579e22001dec925902ac0ef",
"target": {
"file": "src/main/java/com/fasterxml/jackson/databind/jsontype/impl/SubTypeValidator.java"
},
"deprecated": false
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10650.json"
"2026-04-11T15:27:40Z"