Skip to content

Fix CVE-2024-57699 for json-smart #1030

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

ukumar009
Copy link

@ukumar009
Copy link
Author

Created an issue: #1031

@precoder
Copy link

This is also interesting for us, do you plan to make a bug fix release for the CVE ?

1 similar comment
@precoder
Copy link

This is also interesting for us, do you plan to make a bug fix release for the CVE ?

@ukumar009
Copy link
Author

@spperforce @ppatilperforce @hezhangjian could you please let me know when this fix will be released?

@RDarnel
Copy link

RDarnel commented Feb 20, 2025

For visibility, my company is also anxious to see a patch release for this CVE. Are there any active maintainers still for this repo?

@ukumar009
Copy link
Author

Hi @hezhangjian @spperforce @ppatilperforce @oswaldobapvicjr ,

can some one please let me know when can we merge this PR and when this will be released please.

Please let us know. Lot of developers in the community are eagerly waiting for this fix.

Thanks,

@hezhangjian
Copy link

@ukumar009 I am not maintainer of JsonPath...

@ukumar009
Copy link
Author

Hi @kallestenflo,

I hope you are doing good buddy. Could you please consider this PR gets merged? This is a high severity CVE.
Could you please let us know when this will be released? Lot of developers in the community are eagerly waiting for the fix.

Thank you.

@santhoshg015
Copy link

santhoshg015 commented Mar 4, 2025

Hi @kallestenflo, @jochenberger, @mgreenwood1001 and @greek1979,

#1030 (comment)

Could you please merge this PR soon? It fixes a high-severity CVE. #1030 (comment)

thanks!

@lrozenblyum
Copy link

lrozenblyum commented Mar 6, 2025

@julianladisch
Copy link

No.

jsonpath can be called with a parse mode:
https://github.com/json-path/JsonPath/blob/json-path-2.9.0/json-path/src/main/java/com/jayway/jsonpath/spi/json/JsonSmartJsonProvider.java#L42

json-smart ships with a few predefined parse modes:

  • MODE_PERMISSIVE
  • MODE_RFC4627
  • MODE_JSON_SIMPLE
  • MODE_STRICTEST
  • DEFAULT_PERMISSIVE_MODE

All but the first can be affected of CVE-2024-57699.

json-smart 2.5.2 fixes CVE-2024-57699 for all predefined parse modes: https://github.com/netplex/json-smart-v2/pull/233/files

Therefore it's sufficient to bump the json-smart version to 2.5.2 to fix CVE-2024-57699 when predefined parsers (= predefined parse modes) are used.

In https://bitbucket.org/connect2id/oauth-2.0-sdk-with-openid-connect-extensions/commits/815730fc8c3739d3f3474d1b60bd5b3eda8a49b6 no predefined parse modes are used. Therefore they need to manually add the JSONParser.LIMIT_JSON_DEPTH configuration option to fix the issue.

To fully fix the issue for jsonpath we only need to bump the json-smart version to 2.5.2, this pull request is correct and complete.

@lrozenblyum
Copy link

Thanks for clarification @julianladisch! Then we'll bump json-smart to 2.5.2 in our code as well until json-path with this PR is released.

@jettdc
Copy link

jettdc commented Apr 7, 2025

Bump on this would be great to see this merged

Is this repo still maintained?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.