Vulnerability Description
msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1. Exploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kriszyp | Msgpackr | < 1.10.1 |
Related Weaknesses (CWE)
References
- https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133Patch
- https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgxVendor Advisory
- https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133Patch
- https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgxVendor Advisory
FAQ
What is CVE-2023-52079?
CVE-2023-52079 is a vulnerability with a CVSS score of 6.8 (MEDIUM). msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the d...
How severe is CVE-2023-52079?
CVE-2023-52079 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-52079?
Check the references section above for vendor advisories and patch information. Affected products include: Kriszyp Msgpackr.