Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-51074

Опубликовано: 27 дек. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.

A stack overflow vulnerability was found in the Criteria.parse() method in json-path. This issue occurs due to an uncontrolled recursion caused by specially crafted input, leading to a stack overflow. This vulnerability has the potential to trigger a crash, resulting in a denial of service.

Отчет

Red Hat rates this at maximum of a Moderate impact. When interacting with a server to explore this possible vulnerability, the attacker would be the only one seeing a HTTP 500 error and no other user (or the server entirely) would be vulnerable in a real application scenario with multi-threads.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientsjson-pathNot affected
A-MQ Clients 2json-pathNot affected
Logging Subsystem for Red Hat OpenShiftcom.amazon.opendistroforelasticsearch-opendistro_securityNot affected
OpenShift Developer Tools and Servicesjenkins-2-pluginsWill not fix
OpenShift Serverlessjson-pathAffected
Red Hat AMQ Broker 7json-pathNot affected
Red Hat build of Apicurio Registry 2json-pathNot affected
Red Hat build of Debezium 2json-pathNot affected
Red Hat Build of Keycloakjson-pathNot affected
Red Hat build of OptaPlanner 8json-pathWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2256063json-path: stack-based buffer overflow in Criteria.parse method

EPSS

Процентиль: 31%
0.00116
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 лет назад

json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.

CVSS3: 5.3
nvd
около 2 лет назад

json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.

CVSS3: 5.3
debian
около 2 лет назад

json-path v2.8.0 was discovered to contain a stack overflow via the Cr ...

CVSS3: 5.3
github
около 2 лет назад

json-path Out-of-bounds Write vulnerability

CVSS3: 5.3
fstec
около 2 лет назад

Уязвимость функции Criteria.parse() Java-библиотеки JsonPath, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 31%
0.00116
Низкий

5.3 Medium

CVSS3