-
-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix CVE-2024-57699 for predefined parsers #233
Conversation
json-smart/src/test/java/net/minidev/json/test/TestCVE202457699.java
Outdated
Show resolved
Hide resolved
Is there a reason for all the whitespace changes? |
2510b41
to
e8b2320
Compare
@norrisjeremy |
json-smart/src/main/java/net/minidev/json/parser/JSONParser.java
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's reason to default security, WDYT @UrielCh
e8b2320
to
88dd506
Compare
88dd506
to
c21d854
Compare
the changelog is up to date, nice. |
so the change is that LIMIT_JSON_DEPTH was not enabled by default ? |
When will the new 2.5.2 release be available in the maven repo ? |
Hi @UrielCh and thanks for merging! 🌻
Yes, exactly. Now we're defaulting to security to quote @hezhangjian 🙂 Everyone who creates their own parser instead of using the default MODE constants still needs to enable the option, though.
A new release would be highly appreciated by the Spring Security world. 😄 |
I think this comments is also helpful (taken from https://bitbucket.org/connect2id/oauth-2.0-sdk-with-openid-connect-extensions/issues/494/json-smart-and-cve-2024-57699-configure)
That means:
|
I’ve submitted a request to migrate my access to the new central.sonatype.com and am awaiting validation from support. |
Thank you we are eagerly awaiting the release for this . |
Likewise, awaiting this release ASAP. |
Submitted github/advisory-database#5257 to document the fix in GH Advisory database |
Any update on this? @UrielCh |
Last update 22h ago, sould get next update in 2hours |
I have a question: it seems that the version 2.5.2 is now available, but the older versions disappeared from the metadata XML file: no older versions are present, but if you check a mirror that probably has not been updated yet https://maven-central-eu.storage-download.googleapis.com/maven2/net/minidev/json-smart/maven-metadata.xml Has the 2.5.2 version been released in a different way than usual? This change broke the mvn dependency:go-offline behaviour:
|
See #240 |
Does this fix also resolve the CVE |
If you look on the right hand side of GHSA-pq2g-wx69-c263 you'll see the CVE ID CVE-2024-57699 . So yes it's the same finding :) |
GHSA-pq2g-wx69-c263 references this issue. It also says
|
Weird. It seems that on my end 2.5.2 is still marked as containing CVE-2024-57699:
May be it's a "bug" on sonatype side? https://ossindex.sonatype.org/vulnerability/CVE-2024-57699 UPDATE: I opened: sonatype/ossindex-maven#84 |
fyi, I added a PR for the PoC that is referenced in https://ossindex.sonatype.org/vulnerability/CVE-2024-57699 which uses 2.5.2 and does not fail with exit code 1. |
This is because sonatype uses its own CVE database. We need to report to them individually that there is a known version that is not vulnerable |
fixes #232
Hi @UrielCh!
This is my first PR in your project. I hope it helps to fix the new CVE. I hope that I took the right approach.
Cheers,
Christopher