All versions of the package node-stringbuilder are vulnerable to Out-of-bounds Read due to incorrect memory length calculation, by calling ToBuffer, ToString, or CharAt on a StringBuilder object with a non-empty string value input. It's possible to return previously allocated memory, for example, by providing negative indexes, leading to an Information Disclosure.
References
Link | Resource |
---|---|
https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67 | Exploit Third Party Advisory |
https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281 | Broken Link |
https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617 | Exploit Third Party Advisory |
Configurations
History
09 Sep 2024, 17:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:magiclen:stringbuilder:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
References | () https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67 - Exploit, Third Party Advisory | |
References | () https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281 - Broken Link | |
References | () https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617 - Exploit, Third Party Advisory | |
First Time |
Magiclen stringbuilder
Magiclen |
11 Jul 2024, 13:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-10 05:15
Updated : 2024-09-09 17:36
NVD link : CVE-2024-21524
Mitre link : CVE-2024-21524
CVE.ORG link : CVE-2024-21524
JSON object : View
Products Affected
magiclen
- stringbuilder
CWE
CWE-125
Out-of-bounds Read