GHSA-xqcq-j8w9-3pxv – com.tencyle.fixes:org.codehaus.jettison--jettison
Package
Manager: maven
Name: com.tencyle.fixes:org.codehaus.jettison--jettison
Vulnerable Version: =1.1-tencyle-2.1.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
Jettison parser crash by stackoverflow Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. ### References - https://nvd.nist.gov/vuln/detail/CVE-2022-40149 - https://github.com/jettison-json/jettison/issues/45 - https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46538 - https://github.com/jettison-json/jettison/pull/49/files - https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1 - https://lists.debian.org/debian-lts-announce/2022/11/msg00011.html - https://www.debian.org/security/2023/dsa-5312
Metadata
Created: 2023-08-01T19:53:16Z
Modified: 2023-08-01T19:53:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-xqcq-j8w9-3pxv/GHSA-xqcq-j8w9-3pxv.json
CWE IDs: ["CWE-121", "CWE-787"]
Alternative ID: N/A
Finding: F316
Auto approve: 1