CGA-cr64-vww2-xpq8
Resource Exhaustion vulnerability in jackson-databind (Maven)

Resource Exhaustion No known exploit Fixable By Resolved Security

What is CGA-cr64-vww2-xpq8 About?

This vulnerability is a resource exhaustion issue in FasterXML jackson-databind. It stems from the lack of checks to prevent deep wrapper array nesting during deserialization when a specific feature is enabled, potentially leading to denial of service with crafted input. Exploiting this is moderately complex due to the requirement of enabling the feature and providing malicious data.

Affected Software

  • com.fasterxml.jackson.core:jackson-databind
    • >2.13.0, <2.13.4.2
    • >2.4.0-rc1, <2.12.7.1

Technical Details

The vulnerability affects FasterXML jackson-databind versions and originates from primitive value deserializers. When the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled, there's an absence of checks to prevent excessively deep nesting of wrapper arrays. An attacker can submit a JSON payload with a deeply nested array structure surrounding primitive values. This deep nesting causes the deserialization process to recursively consume significant system resources (e.g., stack memory) during processing, ultimately leading to resource exhaustion, which manifests as a denial of service condition for the application.

What is the Impact of CGA-cr64-vww2-xpq8?

Successful exploitation may allow attackers to cause a denial of service, making the service unavailable to other users.

What is the Exploitability of CGA-cr64-vww2-xpq8?

Exploitation requires interacting with an application that uses the vulnerable FasterXML jackson-databind library, specifically with the UNWRAP_SINGLE_VALUE_ARRAYS feature enabled. The complexity is moderate, as it involves crafting a JSON input with deeply nested wrapper arrays. No specific authentication or elevated privileges are required, provided the attacker can submit JSON data to the application. This is typically a remote attack. The primary constraint is the explicit enablement of the UNWRAP_SINGLE_VALUE_ARRAYS feature. Risk factors include exposing JSON deserialization endpoints to untrusted users and not implementing safeguards against deep recursion.

What are the Known Public Exploits?

PoC Author Link Commentary
No known exploits

What are the Available Fixes for CGA-cr64-vww2-xpq8?

A Fix by Resolved Security Exists!
See how we help you strengthen security with automated backported fixes for your libraries.

About the Fix from Resolved Security

The patch ensures that when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled, only a single level of array wrapping is permitted by explicitly checking for and rejecting nested arrays during deserialization. This prevents malicious input with deeply nested arrays from bypassing checks and triggering stack exhaustion or denial-of-service, thereby addressing CVE-2022-42003. The fix adds targeted checks and error handling to stop processing and raise an exception if additional array nesting is detected.

Available Upgrade Options

  • com.fasterxml.jackson.core:jackson-databind
    • >2.4.0-rc1, <2.12.7.1 → Upgrade to 2.12.7.1
  • com.fasterxml.jackson.core:jackson-databind
    • >2.13.0, <2.13.4.2 → Upgrade to 2.13.4.2

Struggling with dependency upgrades?

See how Resolved Security's drop-in replacements make it simple.

Book a demo

Additional Resources

What are Similar Vulnerabilities to CGA-cr64-vww2-xpq8?

Similar Vulnerabilities: CVE-2022-42004 , CVE-2023-1370 , CVE-2023-26144 , CVE-2023-25153 , CVE-2020-14195