CVE-2022-3433

The aeson library is not safe to use to consume untrusted JSON input. A remote user could abuse this flaw to produce a hash collision in the underlying unordered-containers library by sending specially crafted JSON data, resulting in a denial of service.
References
Link Resource
https://cs-syd.eu/posts/2021-09-11-json-vulnerability Exploit Patch Technical Description Third Party Advisory
https://cs-syd.eu/posts/2021-09-11-json-vulnerability Exploit Patch Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:haskell:aeson:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:19

Type Values Removed Values Added
References () https://cs-syd.eu/posts/2021-09-11-json-vulnerability - Exploit, Patch, Technical Description, Third Party Advisory () https://cs-syd.eu/posts/2021-09-11-json-vulnerability - Exploit, Patch, Technical Description, Third Party Advisory

21 Jul 2023, 18:19

Type Values Removed Values Added
CWE CWE-400
CWE-328
CWE-326

Information

Published : 2022-10-10 22:15

Updated : 2024-11-21 07:19


NVD link : CVE-2022-3433

Mitre link : CVE-2022-3433

CVE.ORG link : CVE-2022-3433


JSON object : View

Products Affected

haskell

  • aeson
CWE
CWE-328

Use of Weak Hash

CWE-326

Inadequate Encryption Strength