// For flags

CVE-2021-32742

Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash

Severity Score

9.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Vapor is a web framework for Swift. In versions 4.47.1 and prior, bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies. The vulnerability is patched in version 4.47.2. As a workaround, one may use an alternative to Vapor's built-in `Data.init(base32Encoded:)`.

Vapor es un framework web para Swift. En las versiones 4.47.1 y anteriores, un bug en la función "Data.init(base32Encoded:)" abre el potencial para exponer la memoria del servidor y/o de bloquear el servidor (Denegación de Servicio) para aplicaciones en las que datos no confiables pueden terminar en dicha función. Vapor no usa actualmente esta función por sí mismo, por lo que esto sólo afecta a las aplicaciones que usan la función impactada directamente o mediante otras dependencias. La vulnerabilidad está parcheada en la versión 4.47.2. Como solución alternativa, se puede usar una alternativa a la función incorporada de Vapor "Data.init(base32Encoded:)"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-07-09 CVE Published
  • 2024-03-24 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Vapor Project
Search vendor "Vapor Project"
Vapor
Search vendor "Vapor Project" for product "Vapor"
< 4.47.2
Search vendor "Vapor Project" for product "Vapor" and version " < 4.47.2"
swift
Affected