Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open CVE with Newtonsoft.Json #172

Open
BC89 opened this issue May 10, 2024 · 1 comment
Open

Open CVE with Newtonsoft.Json #172

BC89 opened this issue May 10, 2024 · 1 comment
Assignees

Comments

@BC89
Copy link

BC89 commented May 10, 2024

During some our static scanning we have been seeing the following that's traceable to dependencies in this package.

Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of expressions with high nesting level that lead to StackOverFlow exception or high CPU and RAM usage. Exploiting this vulnerability results in Denial Of Service (DoS).

The serialization and deserialization path have different properties regarding the issue.

Seems like the recommendation is to update to a more recent version of Newtonsoft and do as described:

To mitigate the issue one either need to update Newtonsoft.Json to 13.0.1 or set MaxDepth parameter in the JsonSerializerSettings. This can be done globally with the following statement. After that the parsing of the nested input will fail fast with Newtonsoft.Json.JsonReaderException:
Wondering if this is on your radar to address?

Current version 16.0.0 .Net

@alfpark
Copy link
Contributor

alfpark commented Jun 26, 2024

Please use assembly binding redirects in the meantime.

Tagging @dpwatrous

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants