The aeson library is not safe to use to consume untrusted JSON input. A remote user could abuse this flaw to produce a hash collision in the underlying unordered-containers library by sending specially crafted JSON data, resulting in a denial of service.
References
Link | Resource |
---|---|
https://cs-syd.eu/posts/2021-09-11-json-vulnerability | Exploit Patch Technical Description Third Party Advisory |
https://cs-syd.eu/posts/2021-09-11-json-vulnerability | Exploit Patch Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://cs-syd.eu/posts/2021-09-11-json-vulnerability - Exploit, Patch, Technical Description, Third Party Advisory |
21 Jul 2023, 18:19
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-328 |
CWE-326 |
Information
Published : 2022-10-10 22:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3433
Mitre link : CVE-2022-3433
CVE.ORG link : CVE-2022-3433
JSON object : View
Products Affected
haskell
- aeson