GHSA-PQWH-C2F3-VXMQ

Vulnerability from github – Published: 2023-06-09 19:31 – Updated: 2023-06-09 19:31
VLAI?
Summary
Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
Details

Impact

A bug in the Data.init(base32Encoded:) function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies.

Patches

This issue has been patched in 4.47.2.

Workarounds

Use an alternative to Vapor's built-in Data.init(base32Encoded:).

For more information

If you have any questions or comments about this advisory: * Open an issue in Vapor * Ask in Discord

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "SwiftURL",
        "name": "github.com/vapor/vapor"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "4.47.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2021-32742"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-502"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2023-06-09T19:31:54Z",
    "nvd_published_at": "2021-07-09T14:15:00Z",
    "severity": "MODERATE"
  },
  "details": "### Impact\nA bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies.\n\n### Patches\nThis issue has been patched in 4.47.2.\n\n### Workarounds\nUse an alternative to Vapor\u0027s built-in `Data.init(base32Encoded:)`.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [Vapor](https://github.com/vapor/vapor)\n* Ask in [Discord](http://vapor.team)",
  "id": "GHSA-pqwh-c2f3-vxmq",
  "modified": "2023-06-09T19:31:54Z",
  "published": "2023-06-09T19:31:54Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/vapor/vapor/security/advisories/GHSA-pqwh-c2f3-vxmq"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32742"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/vapor/vapor"
    },
    {
      "type": "WEB",
      "url": "https://github.com/vapor/vapor/releases/tag/4.47.2"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [],
  "summary": "Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…