logo

CVE-2023-33008 org.apache.johnzon:johnzon-mapper

Package

Manager: maven
Name: org.apache.johnzon:johnzon-mapper
Vulnerable Version: >=0 <1.2.21

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00091 pctl0.26601

Details

Apache Johnzon Deserialization of Untrusted Data vulnerability A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon through 1.2.20.

Metadata

Created: 2023-07-07T12:30:22Z
Modified: 2023-07-14T19:41:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-crqg-jrpj-fc84/GHSA-crqg-jrpj-fc84.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-crqg-jrpj-fc84
Finding: F096
Auto approve: 1