CVE-2024-21631 – Integer overflow in URI leading to potential host spoofing
https://notcve.org/view.php?id=CVE-2024-21631
Vapor is an HTTP web framework for Swift. Prior to version 4.90.0, Vapor's `vapor_urlparser_parse` function uses `uint16_t` indexes when parsing a URI's components, which may cause integer overflows when parsing untrusted inputs. This vulnerability does not affect Vapor directly but could impact applications relying on the URI type for validating user input. The URI type is used in several places in Vapor. A developer may decide to use URI to represent a URL in their application (especially if that URL is then passed to the HTTP Client) and rely on its public properties and methods. • https://github.com/vapor/vapor/commit/6db3d917b5ce5024a84eb265ef65691383305d70 https://github.com/vapor/vapor/security/advisories/GHSA-r6r4-5pr8-gjcp • CWE-20: Improper Input Validation CWE-190: Integer Overflow or Wraparound CWE-1104: Use of Unmaintained Third Party Components •
CVE-2023-44386 – Incorrect request error handling triggers server crash in Vapor
https://notcve.org/view.php?id=CVE-2023-44386
Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all users of affected versions of Vapor. The HTTP1 error handler closed connections when HTTP parse errors occur instead of passing them on. The issue is fixed as of Vapor release 4.84.2. Vapor es un framework web HTTP para Swift. • https://github.com/vapor/vapor/commit/090464a654b03148b139a81f8f5ac63b0856f6f3 https://github.com/vapor/vapor/releases/tag/4.84.2 https://github.com/vapor/vapor/security/advisories/GHSA-3mwq-h3g6-ffhm • CWE-231: Improper Handling of Extra Values CWE-617: Reachable Assertion CWE-696: Incorrect Behavior Order •
CVE-2023-31136 – PostgresNIO processes unencrypted bytes from man-in-the-middle
https://notcve.org/view.php?id=CVE-2023-31136
PostgresNIO is a Swift client for PostgreSQL. Any user of PostgresNIO prior to version 1.14.2 connecting to servers with TLS enabled is vulnerable to a man-in-the-middle attacker injecting false responses to the client's first few queries, despite the use of TLS certificate verification and encryption. The vulnerability is addressed in PostgresNIO versions starting from 1.14.2. There are no known workarounds for unpatched users. • https://github.com/advisories/GHSA-467w-rrqc-395f https://github.com/advisories/GHSA-735f-7qx4-jqq5 https://github.com/apple/swift-nio/pull/2419 https://github.com/vapor/postgres-nio/commit/2df54bc94607f44584ae6ffa74e3cd754fffafc7 https://github.com/vapor/postgres-nio/releases/tag/1.14.2 https://github.com/vapor/postgres-nio/security/advisories/GHSA-9cfh-vx93-84vv https://www.postgresql.org/support/security/CVE-2021-23214 https://www.postgresql.org/support/security/CVE-2021-23222 • CWE-522: Insufficiently Protected Credentials •
CVE-2022-31019 – DoS Vulnerability in URLEncodedFormDecoder in Vapor
https://notcve.org/view.php?id=CVE-2022-31019
Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d "array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n '[_0][0][array]'; done)[string][_0]=hello%20world" http://localhost:8080/foo`. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and a process crash. This issue has been fixed in version 4.61.1. Vapor es un framework web Swift HTTP del lado del servidor. • https://github.com/vapor/vapor/commit/6c63226a4ab82ce53730eb1afb9ca63866fcf033 https://github.com/vapor/vapor/security/advisories/GHSA-qvxg-wjxc-r4gg • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-674: Uncontrolled Recursion •
CVE-2022-31005 – Integer Overflow in Vapor's HTTP Range Request
https://notcve.org/view.php?id=CVE-2022-31005
Vapor is an HTTP web framework for Swift. Users of Vapor prior to version 4.60.3 with FileMiddleware enabled are vulnerable to an integer overflow vulnerability that can crash the application. Version 4.60.3 contains a patch for this issue. As a workaround, disable FileMiddleware and serve via a Content Delivery Network. Vapor es un framework web HTTP para Swift. • https://github.com/vapor/vapor/commit/953a349b539b3e0d3653585c8ffb50c427986df1 https://github.com/vapor/vapor/releases/tag/4.60.3 https://github.com/vapor/vapor/security/advisories/GHSA-vj2m-9f5j-mpr5 • CWE-190: Integer Overflow or Wraparound •