-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stack overflow error caused by jtidy parsing of untrusted Html String #4
Comments
CVE-2023-34623 has been assigned for this issue. |
You could change your coordinates to
to get a fixed version. See https://github.com/jtidy/jtidy. |
I'm using jtidy-1.0.4 still facing CVE-2023-34623 issue. The dependency I'm using: com.github.jtidy jtidy 1.0.4The owasp dependency-check version I'm using is 8.3.1. @haumacher can you check whether the CVE is really fixed or not ? |
For me, it was enough to change the formatting of my html file and apply some defaults. |
Stack overflow error caused by jtidy parsing of untrusted Html String
Description
Using jtidy to parse untrusted Html String may be vulnerable to denial of service (DOS) attacks. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Error Log
PoC
Rectification Solution
Refer to the solution of jackson-databind: Add the depth variable to record the current parsing depth. If the parsing depth exceeds a certain threshold, an exception is thrown. (FasterXML/jackson-databind@fcfc499)
Refer to the GSON solution: Change the recursive processing on deeply nested arrays or JSON objects to stack+iteration processing.((google/gson@2d01d6a20f39881c692977564c1ea591d9f39027))
The text was updated successfully, but these errors were encountered: