Back to bug 2221135
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2023-07-07 09:36:29 UTC | Summary | TRIAGE-CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale | TRIAGE-CVE-2023-33008 johnzon: Prevent inefficient internal conversion from BigDecimal at large scale |
| TEJ RATHI | 2023-07-07 09:38:00 UTC | Summary | TRIAGE-CVE-2023-33008 johnzon: Prevent inefficient internal conversion from BigDecimal at large scale | TRIAGE-CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale |
| TEJ RATHI | 2023-07-07 09:40:00 UTC | CC | aileenc, alampare, alazarot, anstephe, asoldano, avibelli, bbaranow, bgeorges, bmaxwell, brian.stansberry, cdewolf, clement.escoffier, cmoulliard, dandread, darran.lofthouse, dffrench, dhanak, dkreling, dosoudil, emingora, fjuma, fmongiar, gjospin, gmalinko, gsmet, gzaronik, hamadhan, hbraun, ibek, ikanello, ivassile, iweiss, janstey, jmartisk, jnethert, jpoth, jrokos, kverlaen, lbacciot, lgao, lthon, max.andersen, mnovotny, mosmerov, msochure, mstefank, msvehla, ngough, nwallace, pdelbell, peholase, pgallagh, pjindal, pmackay, probinso, rgodfrey, rguimara, rruss, rstancel, rsvoboda, sbiarozk, sdouglas, smaestri, tcunning, tom.jenkinson, tqvarnst, yfang | |
| TEJ RATHI | 2023-07-07 09:55:21 UTC | Blocks | 2221165 | |
| Patrick Del Bello | 2023-07-31 20:34:11 UTC | Doc Text | Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20. A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk. |
|
| Patrick Del Bello | 2023-07-31 20:37:21 UTC | Doc Text | Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. This issue affects Apache Johnzon: through 1.2.20. A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk. | A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk. |
| Patrick Del Bello | 2023-08-11 19:31:29 UTC | Alias | TRIAGE-CVE-2023-33008 | CVE-2023-33008 |
| Summary | TRIAGE-CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale | CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale | ||
| Paige Jung | 2023-08-11 20:19:21 UTC | Doc Text | A flaw was found under Apache Johnzon. An attacker could craft a specific JSON input that Johnzon will deserialize into a BigDecimal. With that Johnzon may start converting large numbers and this could result a Denial of Service risk. | A flaw was found in Apache Johnzon. This issue could allow an attacker to craft a specific JSON input that Johnzon will deserialize into a BigDecimal, which Johnzon may use to start converting large numbers, resulting in a denial of service. |
Back to bug 2221135