logo

CVE-2022-40160 commons-jxpath:commons-jxpath

Package

Manager: maven
Name: commons-jxpath:commons-jxpath
Vulnerable Version: <0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: N/A

EPSS: 0.00089 pctl0.26329

Details

JXPath Out-of-bounds Write vulnerability ## Withdrawn This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references. ## Original Description Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.

Metadata

Created: 2022-10-06T18:52:04Z
Modified: 2022-11-16T21:12:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-mqxp-cjr9-c5jm/GHSA-mqxp-cjr9-c5jm.json
CWE IDs: ["CWE-787"]
Alternative ID: GHSA-mqxp-cjr9-c5jm
Finding: N/A
Auto approve: 0