Lucene search

K
githubGitHub Advisory DatabaseGHSA-MJW4-JJ88-V687
HistoryJul 09, 2024 - 2:13 p.m.

panic on parsing crafted phonenumber inputs

2024-07-0914:13:48
CWE-248
CWE-392
CWE-1284
GitHub Advisory Database
github.com
4
phonenumber parsing
panic
vulnerability
crafted inputs
rust-phonenumber
network
code
upgrade

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

15.8%

Impact

The phonenumber parsing code may panic due to a reachable assert! guard on the phonenumber string.

In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber, e.g. over the network, specifically strings of the form +dwPAA;phone-context=AA, where the “number” part potentially parses as a number larger than 2^56.

Since f69abee1/0.3.4/#52.

0.2.x series is not affected.

Patches

Upgrade to 0.3.6 or higher.

Workarounds

n/a

References

Whereas https://github.com/whisperfish/rust-phonenumber/issues/69 did not provide an example code path, property testing found a few: +dwPAA;phone-context=AA.

Affected configurations

Vulners
Node
phonenumberRange<0.3.6
VendorProductVersionCPE
*phonenumber*cpe:2.3:a:*:phonenumber:*:*:*:*:*:*:*:*

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

15.8%

Related for GHSA-MJW4-JJ88-V687