Description
Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gcg6-xv4f-f749 | janino vulnerable to denial of service due to stack overflow |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T15:47:05.714Z
Reserved: 2023-05-22T00:00:00.000Z
Link: CVE-2023-33546
Updated: 2024-08-02T15:47:05.714Z
Status : Modified
Published: 2023-06-01T13:15:10.743
Modified: 2024-11-21T08:05:41.850
Link: CVE-2023-33546
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA