Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-33008

Опубликовано: 06 июл. 2023
Источник: redhat
CVSS3: 5.3

Описание

Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20.

A flaw was found in Apache Johnzon. This issue could allow an attacker to craft a specific JSON input that Johnzon will deserialize into a BigDecimal, which Johnzon may use to start converting large numbers, resulting in a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 3apache-johnzonAffected
Red Hat Decision Manager 7apache-johnzonOut of support scope
Red Hat Fuse 7apache-johnzonOut of support scope
Red Hat Integration Camel K 1apache-johnzonWill not fix
Red Hat Integration Camel Quarkus 2apache-johnzonWill not fix
Red Hat JBoss Data Grid 7apache-johnzonOut of support scope
Red Hat JBoss Enterprise Application Platform 7apache-johnzonNot affected
Red Hat JBoss Enterprise Application Platform 8apache-johnzonNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packapache-johnzonNot affected
Red Hat Process Automation 7apache-johnzonOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2221135apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
больше 2 лет назад

Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20.

CVSS3: 5.3
github
больше 2 лет назад

Apache Johnzon Deserialization of Untrusted Data vulnerability

CVSS3: 5.3
fstec
больше 2 лет назад

Уязвимость компонента BigDecimal программного средства обработки JSON-файлов Apache Johnzon, позволяющая нарушителю вызвать отказ в обслуживании

5.3 Medium

CVSS3