JXPath Out-of-bounds Write vulnerability
Moderate severity
GitHub Reviewed
Published
Oct 6, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Withdrawn
This advisory was withdrawn on Nov 16, 2022
Description
Published by the National Vulnerability Database
Oct 6, 2022
Published to the GitHub Advisory Database
Oct 6, 2022
Reviewed
Oct 10, 2022
Withdrawn
Nov 16, 2022
Last updated
Jan 28, 2023
Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
References