GHSA-PQWH-C2F3-VXMQ
Vulnerability from github – Published: 2023-06-09 19:31 – Updated: 2023-06-09 19:31
VLAI?
Summary
Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
Details
Impact
A bug in the Data.init(base32Encoded:) function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies.
Patches
This issue has been patched in 4.47.2.
Workarounds
Use an alternative to Vapor's built-in Data.init(base32Encoded:).
For more information
If you have any questions or comments about this advisory: * Open an issue in Vapor * Ask in Discord
{
"affected": [
{
"package": {
"ecosystem": "SwiftURL",
"name": "github.com/vapor/vapor"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.47.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-32742"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": true,
"github_reviewed_at": "2023-06-09T19:31:54Z",
"nvd_published_at": "2021-07-09T14:15:00Z",
"severity": "MODERATE"
},
"details": "### Impact\nA bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies.\n\n### Patches\nThis issue has been patched in 4.47.2.\n\n### Workarounds\nUse an alternative to Vapor\u0027s built-in `Data.init(base32Encoded:)`.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Vapor](https://github.com/vapor/vapor)\n* Ask in [Discord](http://vapor.team)",
"id": "GHSA-pqwh-c2f3-vxmq",
"modified": "2023-06-09T19:31:54Z",
"published": "2023-06-09T19:31:54Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/vapor/vapor/security/advisories/GHSA-pqwh-c2f3-vxmq"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32742"
},
{
"type": "PACKAGE",
"url": "https://github.com/vapor/vapor"
},
{
"type": "WEB",
"url": "https://github.com/vapor/vapor/releases/tag/4.47.2"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…