CVE-2023-7272

In Eclipse Parsson before 1.0.4 and 1.1.3, a document with a large depth of nested objects can allow an attacker to cause a Java stack overflow exception and denial of service. Eclipse Parsson allows processing (e.g. parse, generate, transform and query) JSON documents.
References
Link Resource
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 Exploit Issue Tracking Vendor Advisory
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eclipse:parsson:*:*:*:*:*:*:*:*
cpe:2.3:a:eclipse:parsson:*:*:*:*:*:*:*:*

History

06 Feb 2025, 18:07

Type Values Removed Values Added
CPE cpe:2.3:a:eclipse:parsson:*:*:*:*:*:*:*:*
First Time Eclipse parsson
Eclipse
References () https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 - () https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 - Exploit, Issue Tracking, Vendor Advisory

Information

Published : 2024-07-17 15:15

Updated : 2025-02-06 18:07


NVD link : CVE-2023-7272

Mitre link : CVE-2023-7272

CVE.ORG link : CVE-2023-7272


JSON object : View

Products Affected

eclipse

  • parsson
CWE
CWE-787

Out-of-bounds Write