First published: Tue Aug 08 2023(Updated: )
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fasterxml Jackson-dataformats-text | <2.15.0 | |
maven/com.fasterxml.jackson.dataformat:jackson-dataformats-text | <2.15.0 | 2.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-3894.
The software affected by this vulnerability is Fasterxml Jackson-dataformats-text version up to and excluding 2.15.0.
The severity of CVE-2023-3894 is high with a CVSS score of 8.6.
An attacker can exploit this vulnerability by supplying malicious content that causes the parser to crash, leading to a denial of service attack.
To fix CVE-2023-3894, update to a version of Fasterxml Jackson-dataformats-text that is above 2.15.0.