-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Fix CVE-2024-57699 for json-smart #1030
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Created an issue: #1031 |
This is also interesting for us, do you plan to make a bug fix release for the CVE ? |
1 similar comment
This is also interesting for us, do you plan to make a bug fix release for the CVE ? |
@spperforce @ppatilperforce @hezhangjian could you please let me know when this fix will be released? |
For visibility, my company is also anxious to see a patch release for this CVE. Are there any active maintainers still for this repo? |
Hi @hezhangjian @spperforce @ppatilperforce @oswaldobapvicjr , can some one please let me know when can we merge this PR and when this will be released please. Please let us know. Lot of developers in the community are eagerly waiting for this fix. Thanks, |
@ukumar009 I am not maintainer of JsonPath... |
Hi @kallestenflo, I hope you are doing good buddy. Could you please consider this PR gets merged? This is a high severity CVE. Thank you. |
Hi @kallestenflo, @jochenberger, @mgreenwood1001 and @greek1979, Could you please merge this PR soon? It fixes a high-severity CVE. #1030 (comment) thanks! |
Should also the instances of It seems that update itself is not enough to get the protection. |
No. jsonpath can be called with a parse mode: json-smart ships with a few predefined parse modes:
All but the first can be affected of CVE-2024-57699. json-smart 2.5.2 fixes CVE-2024-57699 for all predefined parse modes: https://github.com/netplex/json-smart-v2/pull/233/files Therefore it's sufficient to bump the json-smart version to 2.5.2 to fix CVE-2024-57699 when predefined parsers (= predefined parse modes) are used. In https://bitbucket.org/connect2id/oauth-2.0-sdk-with-openid-connect-extensions/commits/815730fc8c3739d3f3474d1b60bd5b3eda8a49b6 no predefined parse modes are used. Therefore they need to manually add the JSONParser.LIMIT_JSON_DEPTH configuration option to fix the issue. To fully fix the issue for jsonpath we only need to bump the json-smart version to 2.5.2, this pull request is correct and complete. |
Thanks for clarification @julianladisch! Then we'll bump |
Bump on this would be great to see this merged Is this repo still maintained? |
Fixed CVE-2024-57699 for json-smart
For more information: https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699
Changelog: https://github.com/netplex/json-smart-v2