A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
https://security.netapp.com/advisory/ntap-20200904-0005/
https://github.com/FasterXML/jackson-databind/issues/2462