Title: CVE-2022-45688 (High) detected in json-20160212.jar · Issue #9 · turkdevops/browserstack-local-java · GitHub
Open Graph Title: CVE-2022-45688 (High) detected in json-20160212.jar · Issue #9 · turkdevops/browserstack-local-java
X Title: CVE-2022-45688 (High) detected in json-20160212.jar · Issue #9 · turkdevops/browserstack-local-java
Description: CVE-2022-45688 - High Severity Vulnerability Vulnerable Library - json-20160212.jar JSON is a light-weight, language independent, data interchange format. See http://www.JSON.org/ The files in this package implement JSON encoders/decoder...
Open Graph Description: CVE-2022-45688 - High Severity Vulnerability Vulnerable Library - json-20160212.jar JSON is a light-weight, language independent, data interchange format. See http://www.JSON.org/ The files in this...
X Description: CVE-2022-45688 - High Severity Vulnerability Vulnerable Library - json-20160212.jar JSON is a light-weight, language independent, data interchange format. See http://www.JSON.org/ The files in this...
Opengraph URL: https://github.com/turkdevops/browserstack-local-java/issues/9
X: @github
Domain: patch-diff.githubusercontent.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"CVE-2022-45688 (High) detected in json-20160212.jar","articleBody":"## CVE-2022-45688 - High Severity Vulnerability\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20\u003e Vulnerable Library - \u003cb\u003ejson-20160212.jar\u003c/b\u003e\u003c/p\u003e\u003c/summary\u003e\n\n\u003cp\u003eJSON is a light-weight, language independent, data interchange format.\n\t\tSee http://www.JSON.org/\n\n\t\tThe files in this package implement JSON encoders/decoders in Java.\n\t\tIt also includes the capability to convert between JSON and XML, HTTP\n\t\theaders, Cookies, and CDL.\n\n\t\tThis is a reference implementation. There is a large number of JSON packages\n\t\tin Java. Perhaps someday the Java community will standardize on one. Until\n\t\tthen, choose carefully.\n\n\t\tThe license includes this restriction: \"The software shall be used for good,\n\t\tnot evil.\" If your conscience cannot live with that, then choose a different\n\t\tpackage.\u003c/p\u003e\n\u003cp\u003eLibrary home page: \u003ca href=\"https://github.com/douglascrockford/JSON-java\"\u003ehttps://github.com/douglascrockford/JSON-java\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003ePath to dependency file: /pom.xml\u003c/p\u003e\n\u003cp\u003ePath to vulnerable library: /canner/.m2/repository/org/json/json/20160212/json-20160212.jar\u003c/p\u003e\n\u003cp\u003e\n\nDependency Hierarchy:\n - :x: **json-20160212.jar** (Vulnerable Library)\n\u003cp\u003eFound in base branch: \u003cb\u003emaster\u003c/b\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20\u003e Vulnerability Details\u003c/summary\u003e\n\u003cp\u003e \n \nA stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.\n\n\u003cp\u003ePublish Date: 2022-12-13\n\u003cp\u003eURL: \u003ca href=https://www.mend.io/vulnerability-database/CVE-2022-45688\u003eCVE-2022-45688\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20\u003e CVSS 3 Score Details (\u003cb\u003e7.5\u003c/b\u003e)\u003c/summary\u003e\n\u003cp\u003e\n\nBase Score Metrics:\n- Exploitability Metrics:\n - Attack Vector: Network\n - Attack Complexity: Low\n - Privileges Required: None\n - User Interaction: None\n - Scope: Unchanged\n- Impact Metrics:\n - Confidentiality Impact: None\n - Integrity Impact: None\n - Availability Impact: High\n\u003c/p\u003e\nFor more information on CVSS3 Scores, click \u003ca href=\"https://www.first.org/cvss/calculator/3.0\"\u003ehere\u003c/a\u003e.\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20\u003e Suggested Fix\u003c/summary\u003e\n\u003cp\u003e\n\n\u003cp\u003eType: Upgrade version\u003c/p\u003e\n\u003cp\u003eOrigin: \u003ca href=\"https://github.com/advisories/GHSA-3vqj-43w4-2q58\"\u003ehttps://github.com/advisories/GHSA-3vqj-43w4-2q58\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eRelease Date: 2022-12-13\u003c/p\u003e\n\u003cp\u003eFix Resolution: 20230227\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\n***\nStep up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)","author":{"url":"https://github.com/mend-bolt-for-github[bot]","@type":"Person","name":"mend-bolt-for-github[bot]"},"datePublished":"2023-05-02T01:15:37.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/9/browserstack-local-java/issues/9"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:db876fec-c166-e1d6-6b12-bdb806b03aba |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | CCD4:37DD1D:58D9C96:78A7351:697330B5 |
| html-safe-nonce | 57787c932ab9628f52547c2f215f805e81f1e01dccf98a84d875fb857bf6792b |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJDQ0Q0OjM3REQxRDo1OEQ5Qzk2Ojc4QTczNTE6Njk3MzMwQjUiLCJ2aXNpdG9yX2lkIjoiNzA1NjAwNzg1ODg4OTEwOTY4NSIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | 9a7e7a514874d33893c20bf42e5823a3a3e350865e5473b6440772fdf7f9e6dc |
| hovercard-subject-tag | issue:1691638607 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/turkdevops/browserstack-local-java/9/issue_layout |
| twitter:image | https://opengraph.githubassets.com/76acfe2bc5a4616b453987f9fa4db72a76c089ed79c1ba6b63e74576ef63b7cb/turkdevops/browserstack-local-java/issues/9 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/76acfe2bc5a4616b453987f9fa4db72a76c089ed79c1ba6b63e74576ef63b7cb/turkdevops/browserstack-local-java/issues/9 |
| og:image:alt | CVE-2022-45688 - High Severity Vulnerability Vulnerable Library - json-20160212.jar JSON is a light-weight, language independent, data interchange format. See http://www.JSON.org/ The files in this... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | mend-bolt-for-github[bot] |
| hostname | github.com |
| expected-hostname | github.com |
| None | 44ab3188c1dcfe3be0f9c3feca2e04e14fb79f120939ce2395e4f15ab96ec1d4 |
| turbo-cache-control | no-preview |
| go-import | github.com/turkdevops/browserstack-local-java git https://github.com/turkdevops/browserstack-local-java.git |
| octolytics-dimension-user_id | 67343988 |
| octolytics-dimension-user_login | turkdevops |
| octolytics-dimension-repository_id | 380028467 |
| octolytics-dimension-repository_nwo | turkdevops/browserstack-local-java |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | true |
| octolytics-dimension-repository_parent_id | 51923142 |
| octolytics-dimension-repository_parent_nwo | browserstack/browserstack-local-java |
| octolytics-dimension-repository_network_root_id | 51923142 |
| octolytics-dimension-repository_network_root_nwo | browserstack/browserstack-local-java |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | a5e2b48bd1260476599758f5d253b5d24092ab84 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width