CVE-2023-33008 – org.apache.johnzon:johnzon-mapper
Package
Manager: maven
Name: org.apache.johnzon:johnzon-mapper
Vulnerable Version: >=0 <1.2.21
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00091 pctl0.26601
Details
Apache Johnzon Deserialization of Untrusted Data vulnerability A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon through 1.2.20.
Metadata
Created: 2023-07-07T12:30:22Z
Modified: 2023-07-14T19:41:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-crqg-jrpj-fc84/GHSA-crqg-jrpj-fc84.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-crqg-jrpj-fc84
Finding: F096
Auto approve: 1