First published: Wed Feb 05 2025(Updated: )
A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Json-smart | >=2.5.0<=2.5.1 | |
maven/net.minidev:json-smart | >=2.5.0<=2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-57699 is classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2024-57699, update Netplex Json-smart to version 2.5.2 or later.
CVE-2024-57699 is caused by a stack exhaustion triggered by loading specially crafted JSON inputs.
CVE-2024-57699 affects Netplex Json-smart versions 2.5.0 through 2.5.1.
Yes, CVE-2024-57699 can be exploited remotely if an attacker can send specially crafted JSON data to the affected application.