CVE-2022-40160

** DISPUTED ** This record was originally reported by the oss-fuzz project who failed to consider the security context in which JXPath is intended to be used and failed to contact the JXPath maintainers prior to requesting the CVE allocation. The CVE was then allocated by Google in breach of the CNA rules. After review by the JXPath maintainers, the original report was found to be invalid.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:commons_jxpath:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47053 - () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47053 -

15 May 2023, 15:20

Type Values Removed Values Added
Summary Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. ** DISPUTED ** This record was originally reported by the oss-fuzz project who failed to consider the security context in which JXPath is intended to be used and failed to contact the JXPath maintainers prior to requesting the CVE allocation. The CVE was then allocated by Google in breach of the CNA rules. After review by the JXPath maintainers, the original report was found to be invalid.

07 Oct 2022, 18:57

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-06 18:16

Updated : 2024-11-21 07:20


NVD link : CVE-2022-40160

Mitre link : CVE-2022-40160

CVE.ORG link : CVE-2022-40160


JSON object : View

Products Affected

apache

  • commons_jxpath
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write