First published: Wed Jul 17 2024(Updated: )
In Eclipse Parsson before 1.0.4 and 1.1.3, a document with a large depth of nested objects can allow an attacker to cause a Java stack overflow exception and denial of service. Eclipse Parsson allows processing (e.g. parse, generate, transform and query) JSON documents.
Credit: emo@eclipse.org emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.eclipse.parsson:parsson | <1.0.4 | 1.0.4 |
maven/org.eclipse.parsson:parsson | >=1.1.0<1.1.3 | 1.1.3 |
Eclipse Parsson | <1.0.4 | |
Eclipse Parsson | >=1.1.0<1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7272 has a severity rating that indicates it can lead to a denial of service when processing deeply nested JSON documents.
To fix CVE-2023-7272, update Eclipse Parsson to version 1.0.4 or 1.1.3 or later.
CVE-2023-7272 affects Eclipse Parsson versions prior to 1.0.4 and between 1.1.0 and 1.1.2.
CVE-2023-7272 allows attackers to exploit nested object parsing leading to a stack overflow exception.
The impact of CVE-2023-7272 is primarily denial of service due to Java stack overflow exceptions.