-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stack overflow error caused by serialization of List
with cyclic dependency -- NOT CVE
#3973
Comments
Your POC does not have a crafted String. It has this input:
How can an attacker provide this input? I'm not arguing that it would be nice for Jackson to police against this serialization issue but to go around trying to claim that this is a DoS vector is a bit much. |
Agreed with @pjfanning . Missing limit on serialization side is a known gap and we hope to address this (similar to reader-side max-nesting-depth). But there is no automated way for attacker to force generation of "too deep" nesting with 2.15 and later (due to added reader-side limit); nor can they force serialization. |
could be fixed by FasterXML/jackson-core#1055 |
List
with cyclic dependency -- NOT CVE
same issue as #3972 we do not accept that this is a security vulnerability this 2.16 change will improve the handling of cyclic data - FasterXML/jackson-core#1055 |
@pjfanning while that fix would alleviate any issue with cyclic data structures, you might want to rephrase that comment in this context so as not to suggest that the reported issue was valid. Issue is not valid given that the reproduction is invalid; no external attack is possible. My concern is that folks evaluating vulnerabilities would read the comment and assume there was a legit vulnerability that is now pending for a fix to be released. |
Stack overflow error caused by jackson serialization List
Description
jackson before v2.15.2 was discovered to contain a stack overflow via the List parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
Error Log
PoC
Rectification Solution
Refer to the solution of jackson-databind: Add the depth variable to record the current parsing depth. If the parsing depth exceeds a certain threshold, an exception is thrown. (fcfc499)
Refer to the GSON solution: Change the recursive processing on deeply nested arrays or JSON objects to stack+iteration processing.((google/gson@2d01d6a20f39881c692977564c1ea591d9f39027))
References
The text was updated successfully, but these errors were encountered: