First published: Thu Mar 16 2023(Updated: )
A flaw was found in Jettison. Infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This issue leads to a StackOverflowError exception being thrown.
Credit: reefs@jfrog.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.11.1686831822-1.el8 | 2-plugins-0:4.11.1686831822-1.el8 |
redhat/jenkins | <2-plugins-0:4.13.1686680473-1.el8 | 2-plugins-0:4.13.1686680473-1.el8 |
redhat/eap7-jettison | <0:1.5.4-1.redhat_00002.1.el8ea | 0:1.5.4-1.redhat_00002.1.el8ea |
redhat/eap7-jettison | <0:1.5.4-1.redhat_00002.1.el9ea | 0:1.5.4-1.redhat_00002.1.el9ea |
redhat/eap7-jettison | <0:1.5.4-1.redhat_00002.1.el7ea | 0:1.5.4-1.redhat_00002.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.9-1.redhat_00001.1.el7 | 0:18.0.9-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.9-1.redhat_00001.1.el8 | 0:18.0.9-1.redhat_00001.1.el8 |
redhat/rh-sso7-keycloak | <0:18.0.9-1.redhat_00001.1.el9 | 0:18.0.9-1.redhat_00001.1.el9 |
Jettison Project Jettison | <1.5.4 | |
IBM Watson Knowledge Catalog on-prem | <=4.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this issue is CVE-2023-1436.
CVE-2023-1436 has a severity level of high.
CVE-2023-1436 affects IBM Sterling External Authentication Server version 6.0.3 and 6.1.0, Jenkins version 2-plugins-0:4.11.1686831822-1.el8 and 2-plugins-0:4.13.1686680473-1.el8, and EAP7 Jettison version 0:1.5.4-1.redhat_00002.1.el8ea, 0:1.5.4-1.redhat_00002.1.el9ea, and 0:1.5.4-1.redhat_00002.1.el7ea.
An attacker can exploit CVE-2023-1436 by sending a specially crafted request to the vulnerable software, triggering an infinite recursion and causing a denial of service.
Yes, there is a patch available for CVE-2023-1436. For IBM Sterling External Authentication Server, you can find the patch at http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EOther+software&product=ibm/Other+software/Sterling+External+Authentication+Server&release=6.0.2.0&platform=All&function=all. For Jenkins, you can find the patch at http://www.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EOther+software&product=ibm/Other+software/Sterling+External+Authentication+Server&release=6.0.2.0&platform=All&function=all.