Description
Jawn is an open source JSON parser. Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack which may result in a denial of service. Most applications do not implement these traits directly, but inherit from a library. `jawn-parser-1.3.1` fixes this issue and users are advised to upgrade. For users unable to upgrade override `objectContext()` to use a collision-safe collection.
Remediation
References
https://github.com/typelevel/jawn/pull/390
https://github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55
Related Vulnerabilities
CVE-2023-33546 Vulnerability in maven package org.codehaus.janino:janino-parent
CVE-2020-36181 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2022-31103 Vulnerability in npm package lettersanitizer
CVE-2022-41915 Vulnerability in maven package io.netty:netty-codec
CVE-2018-3739 Vulnerability in maven package org.webjars.npm:https-proxy-agent