CVE-2023-3040 Vulnerability Details

  /     /     /  

CVE-2023-3040 Metadata Quick Info

CVE Published: 14/06/2023 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: cloudflare | Vendor: Cloudflare | Product: lua-resty-json
Status : PUBLISHED

CVE-2023-3040 Description

A debug function in the lua-resty-json package, up to commit id 3ef9492bd3a44d9e51301d6adc3cd1789c8f534a (merged in PR #14) contained an out of bounds access bug that could have allowed an attacker to launch a DoS if the function was used to parse untrusted input data. It is important to note that because this debug function was only used in tests and demos, it was not exploitable in a normal environment.

Metrics

CVSS Version: 3.1 | Base Score: 3.7 LOW
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* HIGH
    Privileges Required (PR)* NONE
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* NONE
    Integrity Impact (I)* NONE
    Availability Impact (A)* LOW

Weakness Enumeration (CWE)

CWE-ID: CWE-125
CWE Name: CWE-125 Out-of-bounds Read
Source: Cloudflare

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-540
CAPEC Description: CAPEC-540 Overread Buffers


Source: NVD (National Vulnerability Database).