CVE-2023-4043

Source
https://cve.org/CVERecord?id=CVE-2023-4043
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4043.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-4043
Aliases
Downstream
Published
2023-11-03T09:15:13.600Z
Modified
2026-02-03T07:35:39.264600Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect.

To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale.

References

Affected packages

Git / github.com/eclipse-ee4j/parsson

Affected ranges

Type
GIT
Repo
https://github.com/eclipse-ee4j/parsson
Events

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4043.json"