In Eclipse Parsson before 1.0.4 and 1.1.3, a document with a large depth of nested objects can allow an attacker to cause a Java stack overflow exception and denial of service. Eclipse Parsson allows processing (e.g. parse, generate, transform and query) JSON documents.
References
Link | Resource |
---|---|
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 | Exploit Issue Tracking Vendor Advisory |
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
06 Feb 2025, 18:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:eclipse:parsson:*:*:*:*:*:*:*:* | |
First Time |
Eclipse
Eclipse parsson |
|
References | () https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 - Exploit, Issue Tracking, Vendor Advisory |
21 Nov 2024, 08:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 - |
18 Jul 2024, 12:28
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-17 15:15
Updated : 2025-02-06 18:07
NVD link : CVE-2023-7272
Mitre link : CVE-2023-7272
CVE.ORG link : CVE-2023-7272
JSON object : View
Products Affected
eclipse
- parsson
CWE
CWE-787
Out-of-bounds Write