GHSA-v8x6-59g4-5g3w

Suggest an improvement
Source
https://github.com/advisories/GHSA-v8x6-59g4-5g3w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-v8x6-59g4-5g3w/GHSA-v8x6-59g4-5g3w.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-v8x6-59g4-5g3w
Aliases
Published
2022-06-03T22:18:58Z
Modified
2023-11-01T04:58:54.486086Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial of service binding form from JSON in Play Framework
Details

Impact

A denial-of-service vulnerability has been discovered in Play's forms library, in both the Scala and Java APIs. This can occur when using either the Form#bindFromRequest method on a JSON request body or the Form#bind method directly on a JSON value. If the JSON data being bound to the form contains a deeply-nested JSON object or array, the form binding implementation may consume all available heap space and cause an OutOfMemoryError. If executing on the default dispatcher and akka.jvm-exit-on-fatal-error is enabled—as it is by default—then this can crash the application process.

Form.bindFromRequest is vulnerable when using any body parser that produces a type of AnyContent or JsValue in Scala, or one that can produce a JsonNode in Java. This includes Play's default body parser.

Patches

This vulnerability been patched in version 2.8.16. There is now a global limit on the depth of a JSON object that can be parsed, which can be configured by the user if necessary.

Workarounds

Applications that do not need to parse a request body of type application/json can switch from the default body parser to another body parser that supports only the specific type of body they expect; for example, the formUrlEncoded body parser can be used if the Play action only needs to accept application/x-www-form-urlencoded.

Database specific
{
    "nvd_published_at": "2022-06-02T17:15:00Z",
    "github_reviewed_at": "2022-06-03T22:18:58Z",
    "severity": "HIGH",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-400"
    ]
}
References

Affected packages

Maven / com.typesafe.play:play_2.13

Package

Name
com.typesafe.play:play_2.13
View open source insights on deps.dev
Purl
pkg:maven/com.typesafe.play/play_2.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.8.3
Fixed
2.8.16

Affected versions

2.*

2.8.3
2.8.4
2.8.5
2.8.6
2.8.7
2.8.8-RC1
2.8.8
2.8.9-RC1
2.8.9
2.8.10
2.8.11
2.8.12
2.8.13
2.8.14
2.8.15

Maven / com.typesafe.play:play_2.12

Package

Name
com.typesafe.play:play_2.12
View open source insights on deps.dev
Purl
pkg:maven/com.typesafe.play/play_2.12

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.8.3
Fixed
2.8.16

Affected versions

2.*

2.8.3
2.8.4
2.8.5
2.8.6
2.8.7
2.8.8-RC1
2.8.8
2.8.9-RC1
2.8.9
2.8.10
2.8.11
2.8.12
2.8.13
2.8.14
2.8.15