Magnus Rahl
Jul 1, 2022
  3240
(1 votes)

Addressing vulnerability in Newtonsoft.Json

We have received questions about the recently disclosed vulnerability in Newtonsoft.Json prior to version 13.0.1. Having the dependency doesn't mean you're automatically vulnerable, but since several of our packages depend on Newtonsoft.Json, DXP solutions (including custom code) are theoretically vulnerable. 

The vulnerability was disclosed after 5 PM June 22, and came to our knowledge the next day, June 23. We started investigating immediately and had verified remediation steps early June 24, in the hands of our support teams to respond to customers/partners reaching out about this.

Publishing this information more broadly now is of course a tradeoff between reaching more of our customers and partners, and drawing attention to the vulnerability. However, because Newtonsoft.Json is the #1 used .NET library, it is well known that we are a .NET solution, and the dependency can be seen in public information on Nuget, we decided to go ahead and publish this information together with the remediation.

Remediation

Newer versions like CMS 12, Commerce 14 and Find 14 are not vulnerable since they require Newtonsoft.Json 13.0.1. 

On slightly older solutions, you can simply update Newtonsoft.Json in your solution to version 13.0.1 or later, for example using Nuget Package Manager.

On yet older versions (earlier verisons of CMS 11, Commerce 13, Find 13) you may run into a version restriction. You can override this version restriction by updating the package using the Package Manager Console and supplying the -IgnoreDepencencies flag:

Update-Package Newtonsoft.Json -Version 13.0.1 -IgnoreDependencies

Or simply edit the packages.config file to set the version of Newtonsoft.Json to 13.0.1.

We have gone back quite a few versions and verified that forcing the version restriction does not have any negative side-effects. We have done this as far back as EPiServer.Commerce 13.14.0, EPiServer.CMS 11.14.0 (EPiServer.CMS.UI 11.23.1), EPiServer.Find 13.2.6, EPiServer.Find.Commerce 11.2.0 and EPiServer.ContentDeliveryApi 2.21.0.

If you have any questions, please reach out to support.

Jul 01, 2022

Comments

Please login to comment.
Latest blogs
Optimizely For you Intranet

Having been at Optimizely and in the CMS industry for nearly 16 years I have seen clients’ intranet requirements go from a simple site just to hous...

Robert Folan | Sep 22, 2023

Vulnerability in EPiServer.GoogleAnalytics v3 and v4

Introduction A potential security vulnerability was detected for Optimizely Google Analytics addon (including EPiServer.GoogleAnalytics and...

Bien Nguyen | Sep 20, 2023

Overriding Optimizely’s Content Recommendations Block to Implement Custom Recommendations

Introduction The Content Recommendations add-on for Optimizely CMS dynamically recommends content from your site tailored to the interests of each...

abritt | Sep 13, 2023 | Syndicated blog

Developer contest! Install the AI Assistant and Win Bose QC45 Headphones!

We are thrilled to announce a developer contest where you have the chance to win a pair of Bose Headphones. The goal is to be the first developer t...

Luc Gosso (MVP) | Sep 7, 2023 | Syndicated blog

Send Optimizely notifications with SendGrid API, not SMTP

If your Optimizely site already sends transaction emails through an email platform API, why not do the same with Optimizely notification emails?

Stefan Holm Olsen | Sep 6, 2023 | Syndicated blog

Optimizely Configured Commerce Custom POST API

Introduction When creating custom API controllers for an Optimizely B2B project it’s possible you’ll want to create POST calls. Following the...

Dylan Barter | Sep 6, 2023