Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gcg6-xv4f-f749 janino vulnerable to denial of service due to stack overflow
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T15:47:05.714Z

Reserved: 2023-05-22T00:00:00

Link: CVE-2023-33546

cve-icon Vulnrichment

Updated: 2024-08-02T15:47:05.714Z

cve-icon NVD

Status : Modified

Published: 2023-06-01T13:15:10.743

Modified: 2024-11-21T08:05:41.850

Link: CVE-2023-33546

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-06-01T00:00:00Z

Links: CVE-2023-33546 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses