CVE-2024-0727
Deserialization of Untrusted Data vulnerability in cryptography (PyPI)

Deserialization of Untrusted Data No known exploit

What is CVE-2024-0727 About?

This vulnerability in the 'com.jsoniter:jsoniter' package concerns Deserialization of Untrusted Data via malicious JSON strings. It can lead to a Denial of Service and, in some cases, remote code execution. Exploitation could be straightforward for an attacker able to provide malicious JSON input.

Affected Software

cryptography <42.0.2

Technical Details

The vulnerability affects all versions of the 'com.jsoniter:jsoniter' package. It stems from the unsafe deserialization of untrusted JSON data. When the package processes malicious JSON strings, it fails to properly validate or sanitize the input during the deserialization process. This flaw allows an attacker to inject specially crafted data that, when deserialized, can trigger unexpected behavior within the application. In the best-case scenario, this could lead to a Denial of Service by causing the application to crash or consume excessive resources. In a more severe scenario, if the deserialized data includes executable code or controls vulnerable application logic, it could result in arbitrary code execution.

What is the Impact of CVE-2024-0727?

Successful exploitation may allow attackers to execute arbitrary code with the privileges of the affected application or cause the application to become unresponsive, leading to data manipulation, system compromise, or service interruption.

What is the Exploitability of CVE-2024-0727?

Exploitation requires the ability to provide untrusted, malicious JSON strings to an application using the vulnerable com.jsoniter:jsoniter package. The complexity level is low to moderate, depending on the application's input validation mechanisms. No specific authentication or high privilege levels are inherently required for exploitation, as the vulnerability typically resides in the data processing layer. This is generally a remote vulnerability as the attacker sends the malicious JSON over a network. The likelihood of exploitation increases in applications that accept and deserialize JSON input from external, unauthenticated, or untrusted sources without robust input validation or whitelisting of acceptable types and values.

What are the Known Public Exploits?

PoC Author Link Commentary
No known exploits

What are the Available Fixes for CVE-2024-0727?

Available Upgrade Options

  • cryptography
    • <42.0.2 → Upgrade to 42.0.2

Struggling with dependency upgrades?

See how Resolved Security's drop-in replacements make it simple.

Book a demo

Additional Resources

What are Similar Vulnerabilities to CVE-2024-0727?

Similar Vulnerabilities: CVE-2020-11104 , CVE-2020-11105 , CVE-2020-11106 , CVE-2019-10086 , CVE-2017-7525