{"id":"CVE-2023-4043","details":"In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect.\n\n\nTo mitigate the risk, parsson put in place a size limit for the numbers as well as their scale.\n\n\n","aliases":["GHSA-g8p6-p27c-52fx"],"modified":"2026-04-10T05:02:18.357499Z","published":"2023-11-03T09:15:13.600Z","references":[{"type":"REPORT","url":"https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/13"},{"type":"FIX","url":"https://github.com/eclipse-ee4j/parsson/pull/100"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/eclipse-ee4j/parsson","events":[{"introduced":"0"},{"fixed":"63b1d7393c539921853db1ddc0d92882c5931ae1"},{"introduced":"3266a62f65744415771ea94ec897e6dd51160a3c"},{"fixed":"675484c73328fb5c559ee15ff496f6618c007d9e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.0.5"},{"introduced":"1.1.0"},{"fixed":"1.1.4"}]}}],"versions":["1.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4043.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}