com.fasterxml.jackson.core:jackson-core@2.13.5 vulnerabilities

  • latest version

    2.19.2

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    28 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the com.fasterxml.jackson.core:jackson-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Stack-based Buffer Overflow

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Stack-based Buffer Overflow due to the parse process, which accepts an unlimited input file with deeply nested data. An attacker can cause a stack overflow and crash the application by providing input files with excessively deep nesting.

    How to fix Stack-based Buffer Overflow?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.15.0-rc1 or higher.

    [,2.15.0-rc1)
    • H
    Denial of Service (DoS)

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Denial of Service (DoS) due to missing input size validation when performing numeric type conversions. A remote attacker can exploit this vulnerability by causing the application to deserialize data containing certain numeric types with large values, causing the application to exhaust all available resources.

    How to fix Denial of Service (DoS)?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.15.0-rc1 or higher.

    [2.0.0-RC1,2.15.0-rc1)