Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon. A malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. Affected versions: Apache Johnzon through 1.2.20 References: https://johnzon.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-33008 https://issues.apache.org/jira/browse/JOHNZON-397
This issue has been addressed in the following products: RHINT Camel-Springboot 4.0.0 Via RHSA-2023:5441 https://access.redhat.com/errata/RHSA-2023:5441
This issue has been addressed in the following products: AMQ Broker 7.11.2 Via RHSA-2023:5491 https://access.redhat.com/errata/RHSA-2023:5491
This issue has been addressed in the following products: Spring Boot 2.7.17 Via RHSA-2023:6114 https://access.redhat.com/errata/RHSA-2023:6114