CVE-2023-52079

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52079
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52079.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52079
Aliases
Published
2023-12-28T15:20:20.728Z
Modified
2025-12-05T00:13:45.318761Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
Conversion of property names to strings can trigger infinite recursion
Details

msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1.
Exploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue.

Database specific
{
    "cwe_ids": [
        "CWE-674",
        "CWE-754"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52079.json"
}
References

Affected packages

Git / github.com/kriszyp/msgpackr

Affected ranges

Type
GIT
Repo
https://github.com/kriszyp/msgpackr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.10.0
v1.3.0
v1.3.2
v1.4.5
v1.5.0
v1.5.6
v1.6.0
v1.7.0
v1.8.0
v1.8.3
v1.9.0
v1.9.3
v1.9.5
v1.9.6
v1.9.7
v1.9.8
v1.9.9

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52079.json"