This affects all versions of package dicer. A malicious attacker can send a modified form to server, and crash the nodejs service. An attacker could sent the payload again and again so that the service continuously crashes.
References
Link | Resource |
---|---|
https://github.com/mscdex/busboy/issues/250 | Patch Third Party Advisory |
https://github.com/mscdex/dicer/pull/22 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/mscdex/dicer/pull/22/commits/b7fca2e93e8e9d4439d8acc5c02f5e54a0112dac | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-DICER-2311764 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-05-20 20:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-24434
Mitre link : CVE-2022-24434
CVE.ORG link : CVE-2022-24434
JSON object : View
Products Affected
dicer_project
- dicer
CWE