-
Notifications
You must be signed in to change notification settings - Fork 1.7k
JSON Smart Security Vulnerability #676
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
It's already possible :) see here: https://github.com/json-path/JsonPath/blob/master/README.md#jsonprovider-spi To exclude it from your application, simply perform an
then you can exclude it in your pom.xml:
If possible, I would submit a PR removing or upgrading JSON Smart support to help the author out. |
That indeed did work. Interesting issue we ran into on our side though. It looks like Spring tries to decorate its message converters with JsonPath if it finds it on the classpath. I had to override the configuration class to prevent this:
|
@exabrial thank you for the code snippet, it's working like a charm, however have a few comments about it:
|
I'd like to add, that the json-smart project is (again) searching for new maintainer, see the update here and the indicating comment on the CVE-2021-27568 fixing issue. |
just release:
All versions number increased. |
JSON-smart is now maintained, for a week or two. if you have some requests, do them quickly. CVE-2021-27568 is fixed for JSON-SMART V2 |
Does this mean that a Json Path release of v2.6.0 would include JSON-smart v2.4.1 where the CVE is fixed ? |
Fixed in 2.6.0 |
…lso related to json-path#682, json-path#676, json-path#513, json-path#252) * Replace hard-coded json-smart parser with one retrieved from context (where available) or default configuration. * This enables a project to _exclude_ the transitive json-smart dependency when setting an alternative default configuration.
JSON Smart has not been updated in a long time and has a security vulnerability associated with it: https://nvd.nist.gov/vuln/detail/CVE-2021-27568
Please allow us to exclude JSON Smart and use a different provider.
The text was updated successfully, but these errors were encountered: