All versions of the package node-stringbuilder are vulnerable to Out-of-bounds Read due to incorrect memory length calculation, by calling ToBuffer, ToString, or CharAt on a StringBuilder object with a non-empty string value input. It's possible to return previously allocated memory, for example, by providing negative indexes, leading to an Information Disclosure.
References
Link | Resource |
---|---|
https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67 | Exploit Third Party Advisory |
https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281 | Broken Link |
https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617 | Exploit Third Party Advisory |
https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67 | Exploit Third Party Advisory |
https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281 | Broken Link |
https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-07-10 05:15
Updated : 2024-11-21 08:54
NVD link : CVE-2024-21524
Mitre link : CVE-2024-21524
CVE.ORG link : CVE-2024-21524
JSON object : View
Products Affected
magiclen
- stringbuilder
CWE
CWE-125
Out-of-bounds Read