In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/FasterXML/jackson-databind/issues/3582 | third party advisory issue tracking exploit |
https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88 | third party advisory patch |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50490 | patch mailing list exploit third party advisory issue tracking |
https://security.gentoo.org/glsa/202210-21 | third party advisory vendor advisory |
https://www.debian.org/security/2022/dsa-5283 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20221118-0008/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html | third party advisory mailing list |