GHSA-pq2g-wx69-c263

Suggest an improvement
Source
https://github.com/advisories/GHSA-pq2g-wx69-c263
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-pq2g-wx69-c263/GHSA-pq2g-wx69-c263.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pq2g-wx69-c263
Aliases
Related
Published
2025-02-06T06:31:26Z
Modified
2025-03-12T15:14:15.507977Z
Downstream
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Netplex Json-smart Uncontrolled Recursion vulnerability
Details

A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.

The fixed version only addresses the default modes provided by JSONParser, such as MODE_RFC4627. If you create the JSONParser manually or with custom options, make sure to set the LIMIT_JSON_DEPTH option.

Database specific
{
    "nvd_published_at": "2025-02-05T22:15:33Z",
    "cwe_ids": [
        "CWE-674"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-02-06T19:01:17Z"
}
References

Affected packages

Maven / net.minidev:json-smart

Package

Name
net.minidev:json-smart
View open source insights on deps.dev
Purl
pkg:maven/net.minidev/json-smart

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.5.0
Fixed
2.5.2

Affected versions

2.*

2.5.0
2.5.1