Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.typelevel/jawn-parser
  4. ›
  5. CVE-2022-21653

CVE-2022-21653: Hash collision in typelevel jawn

January 6, 2022 (updated January 10, 2022)

Jawn is an open source JSON parser. Extenders of the org.typelevel.jawn.SimpleFacade and org.typelevel.jawn.MutableFacade who don’t override objectContext() are vulnerable to a hash collision attack which may result in a denial of service. Most applications do not implement these traits directly, but inherit from a library. jawn-parser-1.3.1 fixes this issue and users are advised to upgrade. For users unable to upgrade override objectContext() to use a collision-safe collection.

References

  • github.com/advisories/GHSA-vc89-hccf-rq55
  • github.com/typelevel/jawn/pull/390
  • github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55
  • nvd.nist.gov/vuln/detail/CVE-2022-21653

Code Behaviors & Features

Detect and mitigate CVE-2022-21653 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.3.2

Fixed versions

  • 1.3.2

Solution

Upgrade to version 1.3.2 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Source file

maven/org.typelevel/jawn-parser/CVE-2022-21653.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:48 +0000.