com.fasterxml.jackson.core:jackson-core@2.4.5

  • latest version

    2.21.2

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    18 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the com.fasterxml.jackson.core:jackson-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Allocation of Resources Without Limits or Throttling

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in which the non-blocking async JSON parser can be made to bypass the maxNumberLength constraint (default: 1000 characters) defined in StreamReadConstraints. An attacker can cause excessive memory allocation and CPU exhaustion by submitting JSON documents containing extremely long numeric values through the asynchronous parser interface.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.18.6, 2.21.1 or higher.

    [2.0.0,2.18.6)[2.19.0,2.21.1)
    • H
    Stack-based Buffer Overflow

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Stack-based Buffer Overflow due to the parse process, which accepts an unlimited input file with deeply nested data. An attacker can cause a stack overflow and crash the application by providing input files with excessively deep nesting.

    How to fix Stack-based Buffer Overflow?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.15.0-rc1 or higher.

    [,2.15.0-rc1)
    • M
    Information Exposure

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Information Exposure due to the JsonLocation._appendSourceDesc method. An attacker can access up to 500 bytes of unintended memory content by exploiting exception messages that incorrectly read from the beginning of a byte array instead of the logical payload start.

    How to fix Information Exposure?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.13.0-rc1 or higher.

    [2.0.0,2.13.0-rc1)
    • H
    Denial of Service (DoS)

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Denial of Service (DoS) due to missing input size validation when performing numeric type conversions. A remote attacker can exploit this vulnerability by causing the application to deserialize data containing certain numeric types with large values, causing the application to exhaust all available resources.

    How to fix Denial of Service (DoS)?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.15.0-rc1 or higher.

    [2.0.0-RC1,2.15.0-rc1)
    • M
    Denial of Service (DoS)

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Denial of Service (DoS). When WRITE_BIGDECIMAL_AS_PLAIN setting is enabled, Jackson will attempt to write out the whole number, no matter how large the exponent. The following sample code will trigger an out of memory exception:

    ObjectMapper mapper = new ObjectMapper().enable(JsonGenerator.Feature.WRITE_BIGDECIMAL_AS_PLAIN);
    mapper.writeValueAsString(new java.math.BigDecimal("9.223372E+1010671858"));
    

    How to fix Denial of Service (DoS)?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.7.7 or higher.

    [2.3.0-rc1,2.7.7)
    • M
    Denial of Service (DoS)

    com.fasterxml.jackson.core:jackson-core is a Core Jackson abstractions, basic JSON streaming API implementation

    Affected versions of this package are vulnerable to Denial of Service (DoS). If the REST endpoint consumes POST requests with JSON or XML data and data are invalid, the first unrecognized token is printed to server.log

    If the first token is word of length 10MB, the whole word is printed. This is potentially dangerous and can be used to attack the server by filling the disk with logs.

    How to fix Denial of Service (DoS)?

    Upgrade com.fasterxml.jackson.core:jackson-core to version 2.8.6 or higher.

    [,2.8.6)