{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-52079","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-12-26T12:53:20.670Z","datePublished":"2023-12-28T15:20:20.728Z","dateUpdated":"2024-08-27T14:59:13.839Z"},"containers":{"cna":{"title":"Conversion of property names to strings can trigger infinite recursion","problemTypes":[{"descriptions":[{"cweId":"CWE-674","lang":"en","description":"CWE-674: Uncontrolled Recursion","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-754","lang":"en","description":"CWE-754: Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx","tags":["x_refsource_CONFIRM"],"url":"https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx"},{"name":"https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602","tags":["x_refsource_MISC"],"url":"https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602"}],"affected":[{"vendor":"kriszyp","product":"msgpackr","versions":[{"version":"< 1.10.1","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-12-28T15:20:20.728Z"},"descriptions":[{"lang":"en","value":"msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1.  \nExploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue."}],"source":{"advisory":"GHSA-7hpj-7hhx-2fgx","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:48:12.173Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx"},{"name":"https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-27T14:47:28.561927Z","id":"CVE-2023-52079","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-27T14:59:13.839Z"}}]}}