First published: Wed Dec 27 2023(Updated: )
json-path is vulnerable to a denial of service, caused by a stack-based buffer overflow in the Criteria.parse method. By sending a specially crafted input, a remote attacker could exploit this vulnerability to cause an uncontrolled recursion, and results in a denial of service condition.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.jayway.jsonpath:json-path | >=2.2.0<2.9.0 | 2.9.0 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
jsonpath | =2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51074 is classified as a denial of service vulnerability due to a stack-based buffer overflow.
To remediate CVE-2023-51074, upgrade json-path to version 2.9.0 or later.
CVE-2023-51074 affects json-path versions up to 2.8.0.
Yes, a remote attacker can exploit CVE-2023-51074 by sending specially crafted input.
CVE-2023-51074 impacts json-path and products like IBM Cognos Analytics versions up to 12.0.3.