Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-31018

Опубликовано: 02 июн. 2022
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

Play Framework is a web framework for Java and Scala. A denial of service vulnerability has been discovered in verions 2.8.3 through 2.8.15 of Play's forms library, in both the Scala and Java APIs. This can occur when using either the Form#bindFromRequest method on a JSON request body or the Form#bind method directly on a JSON value. If the JSON data being bound to the form contains a deeply-nested JSON object or array, the form binding implementation may consume all available heap space and cause an OutOfMemoryError. If executing on the default dispatcher and akka.jvm-exit-on-fatal-error is enabled—as it is by default—then this can crash the application process. Form.bindFromRequest is vulnerable when using any body parser that produces a type of AnyContent or JsValue in Scala, or one that can produce a JsonNode in Java. This includes Play's default body parser. This vulnerability been patched in version 2.8.16. There is now a global limit on the depth of a JSON ob

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:lightbend:play_framework:*:*:*:*:*:*:*:*
Версия от 2.8.3 (включая) до 2.8.15 (включая)

EPSS

Процентиль: 66%
0.00506
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

Denial of service binding form from JSON in Play Framework

EPSS

Процентиль: 66%
0.00506
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-400