
CVE-2024-21631 – Integer overflow in URI leading to potential host spoofing
https://notcve.org/view.php?id=CVE-2024-21631
03 Jan 2024 — Vapor is an HTTP web framework for Swift. Prior to version 4.90.0, Vapor's `vapor_urlparser_parse` function uses `uint16_t` indexes when parsing a URI's components, which may cause integer overflows when parsing untrusted inputs. This vulnerability does not affect Vapor directly but could impact applications relying on the URI type for validating user input. The URI type is used in several places in Vapor. A developer may decide to use URI to represent a URL in their application (especially if that URL is t... • https://github.com/vapor/vapor/commit/6db3d917b5ce5024a84eb265ef65691383305d70 • CWE-20: Improper Input Validation CWE-190: Integer Overflow or Wraparound CWE-1104: Use of Unmaintained Third Party Components •

CVE-2023-44386 – Incorrect request error handling triggers server crash in Vapor
https://notcve.org/view.php?id=CVE-2023-44386
05 Oct 2023 — Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all users of affected versions of Vapor. The HTTP1 error handler closed connections when HTTP parse errors occur instead of passing them on. The issue is fixed as of Vapor release 4.84.2. Vapor es un framework web HTTP para Swift. • https://github.com/vapor/vapor/commit/090464a654b03148b139a81f8f5ac63b0856f6f3 • CWE-231: Improper Handling of Extra Values CWE-617: Reachable Assertion CWE-696: Incorrect Behavior Order •

CVE-2022-31019 – DoS Vulnerability in URLEncodedFormDecoder in Vapor
https://notcve.org/view.php?id=CVE-2022-31019
06 Jun 2022 — Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d "array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n '[_0][0][array]'; done)[string][_0]=hello%20world" http://localhost:8080/foo`. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and a process crash. This issue has been fixed in version 4.61.1.... • https://github.com/vapor/vapor/commit/6c63226a4ab82ce53730eb1afb9ca63866fcf033 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-674: Uncontrolled Recursion •

CVE-2022-31005 – Integer Overflow in Vapor's HTTP Range Request
https://notcve.org/view.php?id=CVE-2022-31005
31 May 2022 — Vapor is an HTTP web framework for Swift. Users of Vapor prior to version 4.60.3 with FileMiddleware enabled are vulnerable to an integer overflow vulnerability that can crash the application. Version 4.60.3 contains a patch for this issue. As a workaround, disable FileMiddleware and serve via a Content Delivery Network. Vapor es un framework web HTTP para Swift. • https://github.com/vapor/vapor/commit/953a349b539b3e0d3653585c8ffb50c427986df1 • CWE-190: Integer Overflow or Wraparound •

CVE-2021-32742 – Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
https://notcve.org/view.php?id=CVE-2021-32742
09 Jul 2021 — Vapor is a web framework for Swift. In versions 4.47.1 and prior, bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies. The vulnerability is patched in version 4.47.2. As a workaround, one may use an ... • https://github.com/vapor/vapor/releases/tag/4.47.2 • CWE-502: Deserialization of Untrusted Data •

CVE-2021-21328 – Denial of Service
https://notcve.org/view.php?id=CVE-2021-21328
26 Feb 2021 — Vapor is a web framework for Swift. In Vapor before version 4.40.1, there is a DoS attack against anyone who Bootstraps a metrics backend for their Vapor app. The following is the attack vector: 1. send unlimited requests against a vapor instance with different paths. this will create unlimited counters and timers, which will eventually drain the system. 2. downstream services might suffer from this attack as well by being spammed with error paths. This has been patched in 4.40.1. The `DefaultResponder` wil... • https://github.com/vapor/vapor/commit/e3aa712508db2854ac0ab905696c65fd88fa7e23 • CWE-400: Uncontrolled Resource Consumption •

CVE-2020-15230 – Arbitrary file read un Vapor
https://notcve.org/view.php?id=CVE-2020-15230
02 Oct 2020 — Vapor is a web framework for Swift. In Vapor before version 4.29.4, Attackers can access data at arbitrary filesystem paths on the same host as an application. Only applications using FileMiddleware are affected. This is fixed in version 4.29.4. Vapor es un framework web para Swift. • https://github.com/vapor/vapor/commit/cf1651f7ff76515593f4d8ca6e6e15d2247fe255 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •