-
Notifications
You must be signed in to change notification settings - Fork 8
Description
CVE-2021-27568 - High Severity Vulnerability
Vulnerable Library - json-smart-2.3.jar
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.
Library home page: http://www.minidev.net/
Path to dependency file: /fuse-domain/fuse-domain-dragons/fuse-domain-dragons-test/pom.xml
Path to vulnerable library: /112900_AXELTO/downloadResource_DRBWXO/20220331112913/json-smart-2.3.jar
Dependency Hierarchy:
- ❌ json-smart-2.3.jar (Vulnerable Library)
Found in HEAD commit: 232607a690b8c44b4ca3be726580049f10fb6b19
Vulnerability Details
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
Publish Date: 2021-02-23
URL: CVE-2021-27568
CVSS 3 Score Details (9.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: netplex/json-smart-v1#7
Release Date: 2021-02-23
Fix Resolution: net.minidev:json-smart-mini:1.3.2;net.minidev:json-smart:1.3.2,2.3.1,2.4.2;net.minidev:json-smart-action:2.3.1,2.4.2
Step up your Open Source Security Game with WhiteSource here