{
  "threat_severity" : "Moderate",
  "public_date" : "2023-07-06T00:00:00Z",
  "bugzilla" : {
    "description" : "apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale",
    "id" : "2221135",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2221135"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-502",
  "details" : [ "Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache Johnzon.\nA malicious attacker can craft up some JSON input that uses large numbers (numbers such as 1e20000000) that Apache Johnzon will deserialize into BigDecimal and maybe use numbers too large which may result in a slow conversion (Denial of service risk). Apache Johnzon 1.2.21 mitigates this by setting a scale limit of 1000 (by default) to the BigDecimal. \nThis issue affects Apache Johnzon: through 1.2.20.", "A flaw was found in Apache Johnzon. This issue could allow an attacker to craft a specific JSON input that Johnzon will deserialize into a BigDecimal, which Johnzon may use to start converting large numbers, resulting in a denial of service." ],
  "affected_release" : [ {
    "product_name" : "AMQ Broker 7.11.2",
    "release_date" : "2023-10-05T00:00:00Z",
    "advisory" : "RHSA-2023:5491",
    "cpe" : "cpe:/a:redhat:amq_broker:7",
    "package" : "apache-johnzon"
  }, {
    "product_name" : "RHINT Camel-Springboot 4.0.0",
    "release_date" : "2023-10-04T00:00:00Z",
    "advisory" : "RHSA-2023:5441",
    "cpe" : "cpe:/a:redhat:camel_spring_boot:4.0.0",
    "package" : "apache-johnzon"
  }, {
    "product_name" : "Spring Boot 2.7.17",
    "release_date" : "2023-10-25T00:00:00Z",
    "advisory" : "RHSA-2023:6114",
    "cpe" : "cpe:/a:redhat:openshift_application_runtimes:1.0",
    "package" : "apache-johnzon"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat build of Apache Camel for Spring Boot 3",
    "fix_state" : "Affected",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:camel_spring_boot:3"
  }, {
    "product_name" : "Red Hat Decision Manager 7",
    "fix_state" : "Out of support scope",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_brms_platform:7"
  }, {
    "product_name" : "Red Hat Fuse 7",
    "fix_state" : "Out of support scope",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7"
  }, {
    "product_name" : "Red Hat Integration Camel K 1",
    "fix_state" : "Will not fix",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:integration:1"
  }, {
    "product_name" : "Red Hat Integration Camel Quarkus 2",
    "fix_state" : "Will not fix",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:camel_quarkus:2"
  }, {
    "product_name" : "Red Hat JBoss Data Grid 7",
    "fix_state" : "Out of support scope",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:jboss_data_grid:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 7",
    "fix_state" : "Not affected",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 8",
    "fix_state" : "Not affected",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:8"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform Expansion Pack",
    "fix_state" : "Not affected",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:jbosseapxp"
  }, {
    "product_name" : "Red Hat Process Automation 7",
    "fix_state" : "Out of support scope",
    "package_name" : "apache-johnzon",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_bpms_platform:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-33008\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-33008\nhttps://lists.apache.org/thread/qbg14djo95gfpk7o560lr8wcrzfyw43l" ],
  "name" : "CVE-2023-33008",
  "csaw" : false
}