Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-31019
HistoryJun 06, 2022 - 9:05 p.m.

CVE-2022-31019 DoS Vulnerability in URLEncodedFormDecoder in Vapor

2022-06-0621:05:20
CWE-120
GitHub_M
www.cve.org
2
cve-2022-31019
vapor
dos
urlencodedformdecoder
http
swift
content decoding
stack overflow
process crash

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

24.2%

Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: curl -d "array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n '[_0][0][array]'; done)[string][_0]=hello%20world" http://localhost:8080/foo. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and a process crash. This issue has been fixed in version 4.61.1.

CNA Affected

[
  {
    "product": "vapor",
    "vendor": "vapor",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.61.1"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

24.2%

Related for CVELIST:CVE-2022-31019