CVE-2019-9710

An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meaning that incorrect JSON payloads could have been parsed for concurrent requests.
References
Link Resource
https://github.com/marshmallow-code/webargs/issues/371 Exploit Issue Tracking Third Party Advisory
https://webargs.readthedocs.io/en/latest/changelog.html Release Notes Third Party Advisory
https://github.com/marshmallow-code/webargs/issues/371 Exploit Issue Tracking Third Party Advisory
https://webargs.readthedocs.io/en/latest/changelog.html Release Notes Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:webargs_project:webargs:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:52

Type Values Removed Values Added
References () https://github.com/marshmallow-code/webargs/issues/371 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/marshmallow-code/webargs/issues/371 - Exploit, Issue Tracking, Third Party Advisory
References () https://webargs.readthedocs.io/en/latest/changelog.html - Release Notes, Third Party Advisory () https://webargs.readthedocs.io/en/latest/changelog.html - Release Notes, Third Party Advisory

Information

Published : 2019-03-12 02:29

Updated : 2024-11-21 04:52


NVD link : CVE-2019-9710

Mitre link : CVE-2019-9710

CVE.ORG link : CVE-2019-9710


JSON object : View

Products Affected

webargs_project

  • webargs
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')