GHSA-pqwh-c2f3-vxmq

Suggest an improvement
Source
https://github.com/advisories/GHSA-pqwh-c2f3-vxmq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-pqwh-c2f3-vxmq/GHSA-pqwh-c2f3-vxmq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pqwh-c2f3-vxmq
Aliases
Published
2023-06-09T19:31:54Z
Modified
2023-11-08T04:05:59.103665Z
Summary
Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
Details

Impact

A bug in the Data.init(base32Encoded:) function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies.

Patches

This issue has been patched in 4.47.2.

Workarounds

Use an alternative to Vapor's built-in Data.init(base32Encoded:).

For more information

If you have any questions or comments about this advisory: * Open an issue in Vapor * Ask in Discord

Database specific
{
    "nvd_published_at": "2021-07-09T14:15:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-06-09T19:31:54Z"
}
References

Affected packages

SwiftURL / github.com/vapor/vapor

Package

Name
github.com/vapor/vapor
Purl
pkg:swift/github.com/vapor/vapor

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.47.2