First published: Fri Nov 03 2023(Updated: )
In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect. To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale.
Credit: emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.eclipse.parsson:project | <1.0.5 | 1.0.5 |
maven/org.eclipse.parsson:project | >=1.1.0<1.1.4 | 1.1.4 |
Eclipse Parsson | <1.0.5 | |
Eclipse Parsson | >=1.1.0<1.1.4 | |
redhat/parsson | <1.1.4 | 1.1.4 |
redhat/parsson | <1.0.5 | 1.0.5 |
<1.0.5 | ||
>=1.1.0<1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4043 is a vulnerability in Eclipse Parsson that allows malicious actors to exploit parsing numbers from untrusted sources.
CVE-2023-4043 affects Eclipse Parsson versions 1.0.5 and 1.1.4, allowing malicious actors to exploit parsing numbers from untrusted sources.
The severity of CVE-2023-4043 is medium with a CVSS score of 5.9.
CVE-2023-4043 can be exploited by providing input text of a number with large scale, leading to larger processing and potential denial of service (DoS) attacks.
To fix CVE-2023-4043 in Eclipse Parsson, you should update to versions 1.0.5 or 1.1.4, which contain the necessary fixes for this vulnerability.