CVE-2023-4043 – org.eclipse.parsson:project
Package
Manager: maven
Name: org.eclipse.parsson:project
Vulnerable Version: >=1.1.0 <1.1.4 || >=0 <1.0.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0015 pctl0.36139
Details
Eclipse Parsson Denial of Service vulnerability In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect. To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale.
Metadata
Created: 2023-11-03T09:32:49Z
Modified: 2023-11-03T19:47:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-g8p6-p27c-52fx/GHSA-g8p6-p27c-52fx.json
CWE IDs: ["CWE-20", "CWE-834"]
Alternative ID: GHSA-g8p6-p27c-52fx
Finding: F184
Auto approve: 1