GHSA-493p-pfq6-5258

Suggest an improvement
Source
https://github.com/advisories/GHSA-493p-pfq6-5258
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-493p-pfq6-5258/GHSA-493p-pfq6-5258.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-493p-pfq6-5258
Aliases
Related
Published
2023-03-23T20:32:03Z
Modified
2024-06-25T02:30:52.602434Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
json-smart Uncontrolled Recursion vulnerabilty
Details

Impact

Affected versions of net.minidev:json-smart are vulnerable to Denial of Service (DoS) due to a StackOverflowError when parsing a deeply nested JSON array or object.

When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the 3PP does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause stack exhaustion (stack overflow) and crash the software.

Patches

This vulnerability was fixed in json-smart version 2.4.9, but the maintainer recommends upgrading to 2.4.10, due to a remaining bug.

Workarounds

N/A

References

  • https://www.cve.org/CVERecord?id=CVE-2023-1370
  • https://nvd.nist.gov/vuln/detail/CVE-2023-1370
  • https://security.snyk.io/vuln/SNYK-JAVA-NETMINIDEV-3369748
Database specific
{
    "nvd_published_at": "2023-03-22T06:15:00Z",
    "cwe_ids": [
        "CWE-674"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-03-23T20:32:03Z"
}
References

Affected packages

Maven / net.minidev:json-smart

Package

Name
net.minidev:json-smart
View open source insights on deps.dev
Purl
pkg:maven/net.minidev/json-smart

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.9

Affected versions

1.*

1.0.6.3
1.0.8
1.0.9
1.0.9-1
1.1
1.1.1
1.2
1.3
1.3.1
1.3.2
1.3.3

2.*

2.0-RC1
2.0-RC2
2.0-RC3
2.0
2.1.0
2.1.1
2.2
2.2.1
2.3
2.3.1
2.4.1
2.4.2
2.4.4
2.4.5
2.4.6
2.4.7
2.4.8