cve/2024/CVE-2024-21525.md
2024-08-05 18:41:32 +00:00

19 lines
967 B
Markdown

### [CVE-2024-21525](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21525)
![](https://img.shields.io/static/v1?label=Product&message=node-twain&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions&color=brighgreen)
### Description
All versions of the package node-twain are vulnerable to Improper Check or Handling of Exceptional Conditions due to the length of the source data not being checked. Creating a new twain.TwainSDK with a productName or productFamily, manufacturer, version.info property of length >= 34 chars leads to a buffer overflow vulnerability.
### POC
#### Reference
- https://gist.github.com/dellalibera/55b87634a6c360e5be22a715f0566c99
- https://security.snyk.io/vuln/SNYK-JS-NODETWAIN-6421153
#### Github
- https://github.com/dellalibera/dellalibera