Lucene search

K
cve[email protected]CVE-2023-49800
HistoryDec 09, 2023 - 12:15 a.m.

CVE-2023-49800

2023-12-0900:15:07
CWE-400
CWE-787
CWE-674
web.nvd.nist.gov
12
nuxt-api-party
cve-2023-49800
security
denial of service
stack overflow
upgrade advice

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.1%

nuxt-api-party is an open source module to proxy API requests. The library allows the user to send many options directly to ofetch. There is no filter on which options are available. We can abuse the retry logic to cause the server to crash from a stack overflow. fetchOptions are obtained directly from the request body. A malicious user can construct a URL known to not fetch successfully, then set the retry attempts to a high value, this will cause a stack overflow as ofetch error handling works recursively resulting in a denial of service. This issue has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should limit ofetch options.

Affected configurations

Vulners
NVD
Node
johannschopplichnuxt_api_partyRange<0.22.1
VendorProductVersionCPE
johannschopplichnuxt_api_party*cpe:2.3:a:johannschopplich:nuxt_api_party:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "johannschopplich",
    "product": "nuxt-api-party",
    "versions": [
      {
        "version": "< 0.22.1",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-49800