CVE-2023-25576 – @fastify/multipart vulnerable to DoS due to unlimited number of parts
https://notcve.org/view.php?id=CVE-2023-25576
@fastify/multipart is a Fastify plugin to parse the multipart content-type. Prior to versions 7.4.1 and 6.0.1, @fastify/multipart may experience denial of service due to a number of situations in which an unlimited number of parts are accepted. This includes the multipart body parser accepting an unlimited number of file parts, the multipart body parser accepting an unlimited number of field parts, and the multipart body parser accepting an unlimited number of empty parts as field parts. This is fixed in v7.4.1 (for Fastify v4.x) and v6.0.1 (for Fastify v3.x). There are no known workarounds. • https://github.com/fastify/fastify-multipart/commit/85be81bedf5b29cfd9fe3efc30fb5a17173c1297 https://github.com/fastify/fastify-multipart/releases/tag/v6.0.1 https://github.com/fastify/fastify-multipart/releases/tag/v7.4.1 https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g https://hackerone.com/reports/1816195 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2021-23597 – Denial of Service (DoS)
https://notcve.org/view.php?id=CVE-2021-23597
This affects the package fastify-multipart before 5.3.1. By providing a name=constructor property it is still possible to crash the application. **Note:** This is a bypass of CVE-2020-8136 (https://security.snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-1290382). Esto afecta al paquete fastify-multipart versiones anteriores a 5.3.1. Proporcionando una propiedad name=constructor todavía es posible bloquear la aplicación. • https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066 https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1 https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •
CVE-2020-8136
https://notcve.org/view.php?id=CVE-2020-8136
Prototype pollution vulnerability in fastify-multipart < 1.0.5 allows an attacker to crash fastify applications parsing multipart requests by sending a specially crafted request. Una vulnerabilidad de contaminación de prototipo en fastify-multipart versiones anteriores a 1.0.5, permite a un atacante bloquear rápidamente las aplicaciones que analizan peticiones multipartes mediante el envío de una petición especialmente diseñada. • https://hackerone.com/reports/804772 • CWE-400: Uncontrolled Resource Consumption •