7.5
CWE
20 248 835 400
Advisory Published
Updated

CVE-2021-37714: Input Validation

First published: Wed Aug 18 2021(Updated: )

jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
redhat/eap7-apache-cxf<0:3.3.12-1.redhat_00001.1.el6ea
0:3.3.12-1.redhat_00001.1.el6ea
redhat/eap7-ironjacamar<0:1.5.3-1.Final_redhat_00001.1.el6ea
0:1.5.3-1.Final_redhat_00001.1.el6ea
redhat/eap7-jakarta-el<0:3.0.3-3.redhat_00007.1.el6ea
0:3.0.3-3.redhat_00007.1.el6ea
redhat/eap7-jboss-ejb-client<0:4.0.43-1.Final_redhat_00001.1.el6ea
0:4.0.43-1.Final_redhat_00001.1.el6ea
redhat/eap7-jboss-server-migration<0:1.7.2-10.Final_redhat_00011.1.el6ea
0:1.7.2-10.Final_redhat_00011.1.el6ea
redhat/eap7-jsoup<0:1.14.2-1.redhat_00002.1.el6ea
0:1.14.2-1.redhat_00002.1.el6ea
redhat/eap7-resteasy<0:3.11.5-1.Final_redhat_00001.1.el6ea
0:3.11.5-1.Final_redhat_00001.1.el6ea
redhat/eap7-undertow<0:2.0.41-1.SP1_redhat_00001.1.el6ea
0:2.0.41-1.SP1_redhat_00001.1.el6ea
redhat/eap7-wildfly<0:7.3.10-2.GA_redhat_00003.1.el6ea
0:7.3.10-2.GA_redhat_00003.1.el6ea
redhat/eap7-wildfly-elytron<0:1.10.15-1.Final_redhat_00001.1.el6ea
0:1.10.15-1.Final_redhat_00001.1.el6ea
redhat/eap7-wss4j<0:2.2.7-1.redhat_00001.1.el6ea
0:2.2.7-1.redhat_00001.1.el6ea
redhat/eap7-xml-security<0:2.1.7-1.redhat_00001.1.el6ea
0:2.1.7-1.redhat_00001.1.el6ea
redhat/eap7-apache-cxf<0:3.3.12-1.redhat_00001.1.el7ea
0:3.3.12-1.redhat_00001.1.el7ea
redhat/eap7-ironjacamar<0:1.5.3-1.Final_redhat_00001.1.el7ea
0:1.5.3-1.Final_redhat_00001.1.el7ea
redhat/eap7-jakarta-el<0:3.0.3-3.redhat_00007.1.el7ea
0:3.0.3-3.redhat_00007.1.el7ea
redhat/eap7-jboss-ejb-client<0:4.0.43-1.Final_redhat_00001.1.el7ea
0:4.0.43-1.Final_redhat_00001.1.el7ea
redhat/eap7-jboss-server-migration<0:1.7.2-10.Final_redhat_00011.1.el7ea
0:1.7.2-10.Final_redhat_00011.1.el7ea
redhat/eap7-jsoup<0:1.14.2-1.redhat_00002.1.el7ea
0:1.14.2-1.redhat_00002.1.el7ea
redhat/eap7-resteasy<0:3.11.5-1.Final_redhat_00001.1.el7ea
0:3.11.5-1.Final_redhat_00001.1.el7ea
redhat/eap7-undertow<0:2.0.41-1.SP1_redhat_00001.1.el7ea
0:2.0.41-1.SP1_redhat_00001.1.el7ea
redhat/eap7-wildfly<0:7.3.10-2.GA_redhat_00003.1.el7ea
0:7.3.10-2.GA_redhat_00003.1.el7ea
redhat/eap7-wildfly-elytron<0:1.10.15-1.Final_redhat_00001.1.el7ea
0:1.10.15-1.Final_redhat_00001.1.el7ea
redhat/eap7-wss4j<0:2.2.7-1.redhat_00001.1.el7ea
0:2.2.7-1.redhat_00001.1.el7ea
redhat/eap7-xml-security<0:2.1.7-1.redhat_00001.1.el7ea
0:2.1.7-1.redhat_00001.1.el7ea
redhat/eap7-apache-cxf<0:3.3.12-1.redhat_00001.1.el8ea
0:3.3.12-1.redhat_00001.1.el8ea
redhat/eap7-ironjacamar<0:1.5.3-1.Final_redhat_00001.1.el8ea
0:1.5.3-1.Final_redhat_00001.1.el8ea
redhat/eap7-jakarta-el<0:3.0.3-3.redhat_00007.1.el8ea
0:3.0.3-3.redhat_00007.1.el8ea
redhat/eap7-jboss-ejb-client<0:4.0.43-1.Final_redhat_00001.1.el8ea
0:4.0.43-1.Final_redhat_00001.1.el8ea
redhat/eap7-jboss-server-migration<0:1.7.2-10.Final_redhat_00011.1.el8ea
0:1.7.2-10.Final_redhat_00011.1.el8ea
redhat/eap7-jsoup<0:1.14.2-1.redhat_00002.1.el8ea
0:1.14.2-1.redhat_00002.1.el8ea
redhat/eap7-resteasy<0:3.11.5-1.Final_redhat_00001.1.el8ea
0:3.11.5-1.Final_redhat_00001.1.el8ea
redhat/eap7-undertow<0:2.0.41-1.SP1_redhat_00001.1.el8ea
0:2.0.41-1.SP1_redhat_00001.1.el8ea
redhat/eap7-wildfly<0:7.3.10-2.GA_redhat_00003.1.el8ea
0:7.3.10-2.GA_redhat_00003.1.el8ea
redhat/eap7-wildfly-elytron<0:1.10.15-1.Final_redhat_00001.1.el8ea
0:1.10.15-1.Final_redhat_00001.1.el8ea
redhat/eap7-wss4j<0:2.2.7-1.redhat_00001.1.el8ea
0:2.2.7-1.redhat_00001.1.el8ea
redhat/eap7-xml-security<0:2.1.7-1.redhat_00001.1.el8ea
0:2.1.7-1.redhat_00001.1.el8ea
redhat/jsoup<1.14.2
1.14.2
Jsoup Jsoup<1.14.2
Quarkus Quarkus<=2.2.3
Oracle Banking Trade Finance=14.5
Oracle Banking Treasury Management=14.5
Oracle Business Process Management Suite=12.2.1.3.0
Oracle Business Process Management Suite=12.2.1.4.0
Oracle FLEXCUBE Universal Banking>=14.0.0<=14.3.0
Oracle FLEXCUBE Universal Banking=14.5
Oracle Hospitality Token Proxy Service=19.2
Oracle PeopleSoft Enterprise PeopleTools=8.58
Oracle PeopleSoft Enterprise PeopleTools=8.59
Oracle Primavera Unifier=20.12
Oracle Primavera Unifier=21.12
Oracle Retail Customer Management and Segmentation Foundation>=17.0<=19.0
Oracle WebCenter Portal=12.2.1.3.0
Oracle WebCenter Portal=12.2.1.4.0
Oracle Communications Messaging Server=8.1
Netapp Management Services For Element Software And Netapp Hci
Oracle Financial Services Crime And Compliance Management Studio=8.0.8.2.0
Oracle Financial Services Crime And Compliance Management Studio=8.0.8.3.0
Oracle Middleware Common Libraries And Tools=12.2.1.3.0
Oracle Middleware Common Libraries And Tools=12.2.1.4.0
Oracle Stream Analytics<19.1.0.0.6.4
Oracle Stream Analytics=19c

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203