Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ycjY5LXJ4cjYtOHF3Zs4AA5MJ
serde-json-wasm stack overflow during recursive JSON parsing
When parsing untrusted, deeply nested JSON, the stack may overflow, possibly enabling a Denial of Service attack. This was fixed by adding a check for recursion depth.
Permalink: https://github.com/advisories/GHSA-rr69-rxr6-8qwfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ycjY5LXJ4cjYtOHF3Zs4AA5MJ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 10 months ago
Updated: 10 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-rr69-rxr6-8qwf
References:
- https://github.com/CosmWasm/serde-json-wasm/commit/a9a9b9bf243862bd2afbf6853fca97f30dc4f620
- https://github.com/CosmWasm/serde-json-wasm/commit/e78f9e28b3a2151d3175ee88ab2a001bf9515429
- https://rustsec.org/advisories/RUSTSEC-2024-0012.html
- https://github.com/advisories/GHSA-rr69-rxr6-8qwf
Blast Radius: 22.5
Affected Packages
cargo:serde-json-wasm
Dependent packages: 52Dependent repositories: 1,015
Downloads: 3,453,799 total
Affected Version Ranges: < 0.5.2, = 1.0.0
Fixed in: 0.5.2, 1.0.1
All affected versions: 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.2.1, 0.2.2, 0.2.3, 0.3.0, 0.3.1, 0.3.2, 0.4.0, 0.4.1, 0.5.0, 0.5.1, 1.0.0
All unaffected versions: 0.5.2, 1.0.1