Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-JAVA-ORGCODEHAUSJETTISON-3033152
- published 26 Sep 2022
- disclosed 26 Sep 2022
- credit OSS-Fuzz Team
How to fix?
org.codehaus.jettison:jettison to version 1.5.1 or higher.
Affected versions of this package are vulnerable to Stack-based Buffer Overflow when the parser is running on user supplied input, by allowing an attacker to supply content that causes the parser to crash.