Integer Overflow or Wraparound Affecting github.com/vapor/vapor package, versions <4.90.0
Threat Intelligence
EPSS
0.04% (14th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SWIFT-VAPORVAPOR-6143589
- published 4 Jan 2024
- disclosed 3 Jan 2024
- credit Nicolas Bachschmidt
Introduced: 3 Jan 2024
CVE-2024-21631 Open this link in a new tabHow to fix?
Upgrade vapor/vapor
to version 4.90.0 or higher.
Overview
vapor/vapor is an a server-side Swift HTTP web framework.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound in the vapor_urlparser_parse
function. An attacker can spoof the host by padding the port number with zeros, causing an integer overflow when the URL authority is parsed.
References
CVSS Scores
version 3.1