Description
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.
Remediation
References
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549
https://github.com/jettison-json/jettison/issues/45
https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html
https://www.debian.org/security/2023/dsa-5312
Related Vulnerabilities
CVE-2020-8203 Vulnerability in maven package org.fujion.webjars:lodash
CVE-2022-42004 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2023-49653 Vulnerability in maven package org.jenkins-ci.plugins:jira
CVE-2022-0350 Vulnerability in npm package vditor
CVE-2019-10423 Vulnerability in maven package com.villagechief.codescan.jenkins:codescan