Uncontrolled Recursion Affecting smol-toml package, versions <1.3.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-SMOLTOML-8400853
  • published24 Nov 2024
  • disclosed22 Nov 2024
  • creditTheKodeToad

Introduced: 22 Nov 2024

CVE NOT AVAILABLE CWE-674  (opens in a new tab)

How to fix?

Upgrade smol-toml to version 1.3.1 or higher.

Overview

smol-toml is an A small, fast, and correct TOML parser/serializer

Affected versions of this package are vulnerable to Uncontrolled Recursion by sending deeply nested inline tables that trigger a stack overflow or when attempting to stringify deeply nested objects. This is because there is a lack of limitation of the maximum exploration depth while parsing or producing TOML document.

References

CVSS Scores

version 4.0
version 3.1