You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Stack overflow error caused by json-java serialization Map
Description
json-java before v20230227 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
Error Log
Exception in thread "main" java.lang.StackOverflowError
at org.json.JSONObject.<init>(JSONObject.java:284)
at org.json.JSONObject.wrap(JSONObject.java:2480)
at org.json.JSONObject.wrap(JSONObject.java:2452)
at org.json.JSONObject.<init>(JSONObject.java:291)
at org.json.JSONObject.wrap(JSONObject.java:2480)
at org.json.JSONObject.wrap(JSONObject.java:2452)
at org.json.JSONObject.<init>(JSONObject.java:291)
at org.json.JSONObject.wrap(JSONObject.java:2480)
at org.json.JSONObject.wrap(JSONObject.java:2452)
at org.json.JSONObject.<init>(JSONObject.java:291)
at org.json.JSONObject.wrap(JSONObject.java:2480)
at org.json.JSONObject.wrap(JSONObject.java:2452)
at org.json.JSONObject.<init>(JSONObject.java:291)
at org.json.JSONObject.wrap(JSONObject.java:2480)
at org.json.JSONObject.wrap(JSONObject.java:2452)
at org.json.JSONObject.<init>(JSONObject.java:291)
at org.json.JSONObject.wrap(JSONObject.java:2480)
at org.json.JSONObject.wrap(JSONObject.java:2452)
at org.json.JSONObject.<init>(JSONObject.java:291)
at org.json.JSONObject.wrap(JSONObject.java:2480)
at org.json.JSONObject.wrap(JSONObject.java:2452)
at org.json.JSONObject.<init>(JSONObject.java:291)
Refer to the solution of jackson-databind: Add the depth variable to record the current parsing depth. If the parsing depth exceeds a certain threshold, an exception is thrown. (FasterXML/jackson-databind@fcfc499)
Stack overflow error caused by json-java serialization Map
Description
json-java before v20230227 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
Error Log
PoC
Rectification Solution
Refer to the solution of jackson-databind: Add the depth variable to record the current parsing depth. If the parsing depth exceeds a certain threshold, an exception is thrown. (FasterXML/jackson-databind@fcfc499)
Refer to the GSON solution: Change the recursive processing on deeply nested arrays or JSON objects to stack+iteration processing.((google/gson@2d01d6a20f39881c692977564c1ea591d9f39027))
References