fix CVE-2024-57699 for predefined parsers#233
fix CVE-2024-57699 for predefined parsers#233UrielCh merged 1 commit intonetplex:masterfrom ccudennec-otto:fix-CVE-2024-57699
Conversation
json-smart/src/test/java/net/minidev/json/test/TestCVE202457699.java
Outdated
Show resolved
Hide resolved
|
Is there a reason for all the whitespace changes? |
@norrisjeremy |
json-smart/src/main/java/net/minidev/json/parser/JSONParser.java
Outdated
Show resolved
Hide resolved
hezhangjian
left a comment
There was a problem hiding this comment.
I think it's reason to default security, WDYT @UrielCh
|
the changelog is up to date, nice. |
|
so the change is that LIMIT_JSON_DEPTH was not enabled by default ? |
|
When will the new 2.5.2 release be available in the maven repo ? |
|
Hi @UrielCh and thanks for merging! 🌻
Yes, exactly. Now we're defaulting to security to quote @hezhangjian 🙂 Everyone who creates their own parser instead of using the default MODE constants still needs to enable the option, though.
A new release would be highly appreciated by the Spring Security world. 😄 |
|
I think this comments is also helpful (taken from https://bitbucket.org/connect2id/oauth-2.0-sdk-with-openid-connect-extensions/issues/494/json-smart-and-cve-2024-57699-configure)
That means:
|
|
I’ve submitted a request to migrate my access to the new central.sonatype.com and am awaiting validation from support. |
Thank you we are eagerly awaiting the release for this . |
|
Likewise, awaiting this release ASAP. |
|
Submitted github/advisory-database#5257 to document the fix in GH Advisory database |
|
Any update on this? @UrielCh |
|
Last update 22h ago, sould get next update in 2hours |
|
I have a question: it seems that the version 2.5.2 is now available, but the older versions disappeared from the metadata XML file: no older versions are present, but if you check a mirror that probably has not been updated yet https://maven-central-eu.storage-download.googleapis.com/maven2/net/minidev/json-smart/maven-metadata.xml Has the 2.5.2 version been released in a different way than usual? This change broke the mvn dependency:go-offline behaviour: |
|
See #240 |
|
Does this fix also resolve the CVE |
|
If you look on the right hand side of GHSA-pq2g-wx69-c263 you'll see the CVE ID CVE-2024-57699 . So yes it's the same finding :) |
|
GHSA-pq2g-wx69-c263 references this issue. It also says
|
|
Weird. It seems that on my end 2.5.2 is still marked as containing CVE-2024-57699: May be it's a "bug" on sonatype side? https://ossindex.sonatype.org/vulnerability/CVE-2024-57699 UPDATE: I opened: sonatype/ossindex-maven#84 |
|
fyi, I added a PR for the PoC that is referenced in https://ossindex.sonatype.org/vulnerability/CVE-2024-57699 which uses 2.5.2 and does not fail with exit code 1. |
This is because sonatype uses its own CVE database. We need to report to them individually that there is a known version that is not vulnerable |
fixes #232
Hi @UrielCh!
This is my first PR in your project. I hope it helps to fix the new CVE. I hope that I took the right approach.
Cheers,
Christopher