Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Denial Of Service (DoS) Vulnerability in the Jackson-core library(2.7.9) #491

Closed
qm930708 opened this issue Apr 21, 2023 · 4 comments · Fixed by #492
Closed

Denial Of Service (DoS) Vulnerability in the Jackson-core library(2.7.9) #491

qm930708 opened this issue Apr 21, 2023 · 4 comments · Fixed by #492
Assignees

Comments

@qm930708
Copy link

jackson-core is vulnerable to denial of service (DoS) attacks. The vulnerability is triggered when jackson-core reports an invalid token which has a word of length 10MB. It prints out the token to server.log file without limiting maxTokenLength to 256 bytes. This can cause a denial of service condition by filling up the disk space available.

This issue was fixed in version 2.8.6.

This is the vulnerability summary from veracode. https://sca.analysiscenter.veracode.com/vulnerability-database/security/sca/vulnerability/sid-2857/summary

@greg-db
Copy link
Contributor

greg-db commented Apr 21, 2023

Thanks for the report! I'll ask the team to update this.

@scottme
Copy link

scottme commented May 11, 2023

hi, @devPalacio , I see in the linked pr it is trying to upgrade the jackson-core to 2.8.6, and not the latest version 2.14.x, is there any reason not bump to the latest.

@devPalacio
Copy link
Contributor

@scottme, I had some flakes with our integration tests, and was trying to ensure that it wasn't related to a change in the library. The new release will have jackson-core 2.15.0

@greg-db
Copy link
Contributor

greg-db commented May 17, 2023

This is updated in v5.4.5. Thanks all.

@devPalacio devPalacio self-assigned this May 18, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants