-
-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Uncaught Exception in Parser #60
Comments
Note that this is tied to CVE-2021-27568, categorized as base score 9.1 (critical). |
CVE-2021-27568 is now fully fixed in
|
Can someone explain why this was given a base score of 9.1? |
I think that the issue was more about the vanilla java exception, I think it can disclose the java virtual machine type. I do not know how they measure the score. |
The score was created on MITREs side. I don't know how they calculated it. |
Ok, I dug a bit. MITRE rated it like this:
I would have scored it the same except for Confidentiality: High. I guess that's because of the potential for a stack trace getting returned to the end user? But this bug does not guarantee that a stack trace is returned to the user, for that the library would have to be used by an application returns unexpected stack traces to the user in a 500 body, which well-behaved apps should not be doing anyways. If that understanding is correct, I would have called this Confidentiality: Low or None, which would have given a Base Score of 8.2 or 7.5 respectively -- which are out of the Critical range. There may also be wiggle-room on Availability: High. This bug does not guarantee that the application crashes; that would only be the case if the calling application does not have a generic I'm making a fuss because 9.0 - 10.0 is Critical, and having those show up can trigger emergency patching policies or delays to release schedules. Is it possible to ask MITRE to re-evaluate the scoring of this issue? |
Yes it is, but so far I didn't receive any answer to any comment I gave
them. So in reality, I wouldn't expect anything to happen soon.
Mike Ounsworth ***@***.***> schrieb am Sa., 10. Apr. 2021,
16:21:
… Ok, I bug a bit. MITRE rated it like this:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector: None, Attack Complexity: Low, Privileges Required: None,
User Interaction: None, Scope: Unchanged, Confidentiality: High, Integrity:
None, Availability: High.
I would have scored it the same except for Confidentiality: High. I guess
that's because of the potential for a stack trace getting returned to the
end user? But this bug does not guarantee that a stack trace is returned to
the user, for that the library would have to be used by an application
returns unexpected stack traces to the user in a 500 body, which
well-behaved apps should not be doing anyways. If that understanding is
correct, I would have called this Confidentiality: Low or None, which would
have given a Base Score of 8.2 or 7.5 respectively -- which are out of the
Critical range.
I'm making a fuss because 9.0 - 10.0 is Critical, and having those show up
can trigger emergency patching policies or delays to release schedules. Is
it possible to ask MITRE to re-evaluate the scoring of this issue?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#60 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ADUIUQNKAJTUSQWJBQ6WCDDTIBNHLANCNFSM4YBJRZSA>
.
|
@GanbaruTobi out of curiosity: Would you consider this issue fixed if
And the corresponding public methods that use |
The parser fails to throw the ParseException when the parser expects the input to be of the float number type AND the input not being a valid number. This can lead to uncaught exceptions by unexpected input, which may lead to Denial-of-Service (DoS).
json-smart-v2/json-smart/src/main/java/net/minidev/json/parser/JSONParserBase.java
Lines 139 to 147 in 4402bae
Parser Input of "-." or "2e+" or "[45e-" will crash with a NumberFormatException.
The text was updated successfully, but these errors were encountered: