CVE-2023-52079

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52079
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52079.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52079
Aliases
Related
Published
2023-12-28T16:16:01Z
Modified
2025-01-08T15:32:21.210969Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1.
Exploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue.

References

Affected packages

Git / github.com/kriszyp/msgpackr

Affected ranges

Type
GIT
Repo
https://github.com/kriszyp/msgpackr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*

v1.10.0
v1.3.0
v1.3.2
v1.4.5
v1.5.0
v1.5.6
v1.6.0
v1.7.0
v1.8.0
v1.8.3
v1.9.0
v1.9.3
v1.9.5
v1.9.6
v1.9.7
v1.9.8
v1.9.9