2023-12-13 19:01:06 +00:00

115 lines
4.4 KiB
JSON

{
"id": "CVE-2023-49800",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-09T00:15:07.653",
"lastModified": "2023-12-13T17:30:47.393",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "`nuxt-api-party` is an open source module to proxy API requests. The library allows the user to send many options directly to `ofetch`. There is no filter on which options are available. We can abuse the retry logic to cause the server to crash from a stack overflow. fetchOptions are obtained directly from the request body. A malicious user can construct a URL known to not fetch successfully, then set the retry attempts to a high value, this will cause a stack overflow as ofetch error handling works recursively resulting in a denial of service. This issue has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should limit ofetch options."
},
{
"lang": "es",
"value": "`nuxt-api-party` es un m\u00f3dulo de c\u00f3digo abierto para enviar solicitudes de API. La librer\u00eda permite al usuario enviar muchas opciones directamente a \"ofetch\". No hay ning\u00fan filtro sobre qu\u00e9 opciones est\u00e1n disponibles. Podemos abusar de la l\u00f3gica de reintento para provocar que el servidor falle debido a un desbordamiento de pila. fetchOptions se obtienen directamente del cuerpo de la solicitud. Un usuario malintencionado puede crear una URL que se sabe que no se recupera correctamente y luego establecer los intentos de reintento en un valor alto; esto provocar\u00e1 un desbordamiento de la pila, ya que el manejo de errores de recuperaci\u00f3n funciona de forma recursiva, lo que resulta en una denegaci\u00f3n de servicio. Este problema se solucion\u00f3 en la versi\u00f3n 0.22.1. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben limitar las opciones de grabado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:johannschopplich:nuxt_api_party:*:*:*:*:*:node.js:*:*",
"versionEndIncluding": "0.21.3",
"matchCriteriaId": "3FF05127-C972-40EC-A3E2-6733D255DAA2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}