jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Jsoup
Subscribe
|
Jsoup
Subscribe
|
|
Netapp
Subscribe
|
Management Services For Element Software And Netapp Hci
Subscribe
|
|
Oracle
Subscribe
|
Banking Trade Finance
Subscribe
Banking Treasury Management
Subscribe
Business Process Management Suite
Subscribe
Communications Messaging Server
Subscribe
Financial Services Crime And Compliance Management Studio
Subscribe
Flexcube Universal Banking
Subscribe
Hospitality Token Proxy Service
Subscribe
Middleware Common Libraries And Tools
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
Primavera Unifier
Subscribe
Retail Customer Management And Segmentation Foundation
Subscribe
Stream Analytics
Subscribe
Webcenter Portal
Subscribe
|
|
Quarkus
Subscribe
|
Quarkus
Subscribe
|
|
Redhat
Subscribe
|
Camel Quarkus
Subscribe
Integration
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Application Platform Eus
Subscribe
Jboss Enterprise Bpms Platform
Subscribe
Jboss Fuse
Subscribe
Jbosseapxp
Subscribe
Openshift Application Runtimes
Subscribe
Red Hat Single Sign On
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1791 | jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes. |
Github GHSA |
GHSA-m72m-mhq2-9p6c | Uncaught Exception in jsoup |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 28 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Application Platform Eus
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7 | |
| Vendors & Products |
Redhat jboss Enterprise Application Platform Eus
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T01:23:01.524Z
Reserved: 2021-07-29T00:00:00
Link: CVE-2021-37714
No data.
Status : Modified
Published: 2021-08-18T15:15:08.023
Modified: 2024-11-21T06:15:46.567
Link: CVE-2021-37714
OpenCVE Enrichment
No data.
EUVD
Github GHSA