-
Notifications
You must be signed in to change notification settings - Fork 723
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PPP-4825] - Upgrade to drools 8.44.0.Final #5714
Conversation
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.1Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.3.3Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.3.3Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.1Description: [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.1Description: [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.1Description: [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.3.3Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.1Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.1Description: [ CVE-2022-40149 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.3.3Description: [ CVE-2023-1436 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45693 ] org.codehaus.jettison:jettison 1.2Description: When the The attackers must still find an input that propagates either to the HashMap<String,Object> map=new HashMap<>();
map.put("t",map);
JSONObject jsonObject=new JSONObject(map); Remediation: Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.2Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.2Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2022-40150 ] org.codehaus.jettison:jettison 1.3.3Description: [ CVE-2022-45685 ] org.codehaus.jettison:jettison 1.3.3Description: When the To exploit this issue, the attacker must find an input that propagates to the String s="{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{... (Repeat many times)";
new JSONObject(s); Remediation: Development mitigationsThis issue can be mitigated by checking the nested depth of the input JSON before passing it to the
Development mitigationsWrap the try {
JSONObject jsonObject=new JSONObject(map);
}
catch(StackOverflowError e) {
System.err.println("ERROR: Stack limit reached");
} [ CVE-2012-5783 ] commons-httpclient:commons-httpclient 3.0.1Description: |
No description provided.