[PLUGIN-1904] Fix: Vulnerability issues #107
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Issue:
Resolved high-severity Denial of Service (DoS) vulnerabilities in the org.json:json library and related components. JSON-Java versions up to and including 20230618 included a parser flaw that permitted modestly sized inputs to consume excessive memory, while a stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 and org.json:json versions prior to 20230227 allowed attackers to trigger DoS through crafted JSON or XML payloads. These issues are associated with CVE-2022-45688 and CVE-2023-5072—both classified as high severity.
Root Cause:
Insufficient validation and lack of resource management in the parser exposed the system to stack overflows and memory exhaustion when processing maliciously structured input data.
Fix:
Upgraded org.json:json to secure version 20231013 to resolve both CVE-2022-45688 and CVE-2023-5072, ensuring improved input validation and robust resource limits to prevent DoS exploitation.
JIRA Ticket : https://cdap.atlassian.net/browse/PLUGIN-1904