CVE-2023-3040
Summary
| CVE | CVE-2023-3040 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-06-14 12:15:00 UTC |
| Updated | 2023-06-28 19:16:00 UTC |
| Description | A debug function in the lua-resty-json package, up to commit id 3ef9492bd3a44d9e51301d6adc3cd1789c8f534a (merged in PR #14) contained an out of bounds access bug that could have allowed an attacker to launch a DoS if the function was used to parse untrusted input data. It is important to note that because this debug function was only used in tests and demos, it was not exploitable in a normal environment. |
Risk And Classification
Problem Types: CWE-125
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cloudflare | Lua-resty-json | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fix out-of-bounds read in debug dump_obj function by drcaramelsyrup · Pull Request #14 · cloudflare/lua-resty-json · GitHub | MISC | github.com | |
| Out of Bounds Access Leading to Undefined Behavior · Advisory · cloudflare/lua-resty-json · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.