First published: Tue Jun 01 2021(Updated: )
A flaw was found in the json-smart package in the JSONParserByteArray. This flaw allows an attacker to cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Json-smart Project Json-smart-v1 | >=1.3<1.3.3 | |
Json-smart Project Json-smart-v2 | >=2.4<2.4.4 | |
Oracle Utilities Framework | =4.4.0.0.0 | |
Oracle Utilities Framework | =4.4.0.2.0 | |
Oracle Utilities Framework | =4.4.0.3.0 | |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.1 | |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.0 | |
maven/net.minidev:json-smart | >=2.4.0<2.4.4 | 2.4.4 |
maven/net.minidev:json-smart | >=1.3.0<1.3.3 | 1.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw in the JSONParserByteArray is CVE-2021-31684.
The severity of CVE-2021-31684 is high with a severity value of 7.5.
CVE-2021-31684 affects JSON Smart versions 1.3 and 2.4.
CVE-2021-31684 causes a denial of service (DOS) via a crafted web request.
Yes, there are references available for CVE-2021-31684. You can find them at the following links: [GitHub Issue 10](https://github.com/netplex/json-smart-v1/issues/10), [GitHub Pull Request 11](https://github.com/netplex/json-smart-v1/pull/11), [GitHub Issue 67](https://github.com/netplex/json-smart-v2/issues/67).