Description
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.
Remediation
References
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549
https://github.com/jettison-json/jettison/issues/45
https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html
https://www.debian.org/security/2023/dsa-5312
Related Vulnerabilities
CVE-2019-19771 Vulnerability in npm package ripmed160
CVE-2023-5763 Vulnerability in maven package org.glassfish.main.orb:orb-connector
CVE-2022-42466 Vulnerability in maven package org.apache.isis.viewer:isis-viewer-wicket-ui
CVE-2024-36401 Vulnerability in maven package org.geoserver:gs-wms
CVE-2018-20677 Vulnerability in maven package org.webjars.bowergithub.jasny:bootstrap