First published: Tue May 24 2022(Updated: )
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-ppj4-34rq-v8j9. This link is maintained to preserve external references. ## Original Description GJSON <= 1.9.2 allows attackers to cause a redos via crafted JSON input.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gjson Project Gjson | <=1.9.2 | |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 | |
go/github.com/tidwall/gjson | <1.9.3 | 1.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-42248.
The severity of CVE-2021-42248 is high (7.5).
GJSON versions up to and including 1.9.2, IBM Cloud Pak for Security versions 1.10.0.0 to 1.10.11.0, and IBM QRadar Suite Software versions 1.10.12.0 to 1.10.16.0 are affected.
CVE-2021-42248 can be exploited by a remote attacker to cause a denial of service (DoS).
It is recommended to update to a patched version of the affected software to fix CVE-2021-42248.