First published: Fri Nov 06 2020(Updated: )
An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lightbend Play Framework | <=2.6.25 | |
Lightbend Play Framework | >=2.7.0<=2.7.5 | |
Lightbend Play Framework | >=2.8.0<=2.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27196 is a vulnerability in PlayJava in Play Framework 2.6.0 through 2.8.2 that allows for a Denial of Service (DoS) attack via a JSON stack overflow.
CVE-2020-27196 has a severity rating of 7.5 (High).
The affected software for CVE-2020-27196 is Lightbend Play Framework versions 2.6.0 through 2.8.2.
To fix CVE-2020-27196, it is recommended to upgrade to a version of Lightbend Play Framework that is not affected by the vulnerability.
You can find more information about CVE-2020-27196 on the official Play Framework website.