Lucene search

K
githubGitHub Advisory DatabaseGHSA-VQ23-HWG7-HXRH
HistoryDec 21, 2022 - 9:30 p.m.

EnumStringValues vulnerable to Uncontrolled Resource Consumption

2022-12-2121:30:15
CWE-400
CWE-404
GitHub Advisory Database
github.com
12
brondahl enumstringvalues
vulnerability
resource consumption
upgrade
patch
vdb-216466

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

55.9%

A vulnerability was found in Brondahl EnumStringValues 4.0.1. It has been declared as problematic. This vulnerability affects the function GetStringValuesWithPreferences_Uncache of the file EnumStringValues/EnumExtensions.cs. The manipulation leads to resource consumption. Upgrading to version 4.0.2 to address this issue. The name of the patch is c0fc7806beb24883cc2f9543ebc50c0820297307. It is recommended to upgrade the affected component. VDB-216466 is the identifier assigned to this vulnerability.

Affected configurations

Vulners
Node
enumstringvalues_projectenumstringvaluesRange<4.0.2
CPENameOperatorVersion
enumstringvalueslt4.0.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

55.9%

Related for GHSA-VQ23-HWG7-HXRH