CVE-2023-3894 – com.fasterxml.jackson.dataformat:jackson-dataformats-text
Package
Manager: maven
Name: com.fasterxml.jackson.dataformat:jackson-dataformats-text
Vulnerable Version: >=0 <2.15.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
EPSS: 0.0005 pctl0.15027
Details
Denial of service in jackson-dataformats-text Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Metadata
Created: 2023-08-08T18:30:37Z
Modified: 2023-09-06T15:32:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-rg2c-cfxv-qp6f/GHSA-rg2c-cfxv-qp6f.json
CWE IDs: ["CWE-20", "CWE-400", "CWE-787"]
Alternative ID: GHSA-rg2c-cfxv-qp6f
Finding: F002
Auto approve: 1