Janino 3.1.9 and earlier are subject to denial of service (DOS) attacks when using the expression evaluator.guess parameter name method. If the parser runs on user-supplied input, an attacker could supply content that causes the parser to crash due to a stack overflow. NOTE: this is disputed by multiple parties because Janino is not intended for use with untrusted input.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gcg6-xv4f-f749 | janino vulnerable to denial of service due to stack overflow |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T15:47:05.714Z
Reserved: 2023-05-22T00:00:00
Link: CVE-2023-33546
Updated: 2024-08-02T15:47:05.714Z
Status : Modified
Published: 2023-06-01T13:15:10.743
Modified: 2024-11-21T08:05:41.850
Link: CVE-2023-33546
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA