Github.Com Vapor Vapor vulnerabilities
7 known vulnerabilities affecting github.com/vapor_vapor.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2024-21631MEDIUM≥ 0, < 4.90.02024-01-03
CVE-2024-21631 [MEDIUM] CWE-1104 Vapor contains an integer overflow in URI leading to potential host spoofing
Vapor contains an integer overflow in URI leading to potential host spoofing
Vapor's `vapor_urlparser_parse` function uses `uint16_t` indexes when parsing a URI's components, which may cause integer overflows when parsing untrusted inputs.
This vulnerability does not affect Vapor directly but could impact applications relying on the URI type for validating user input.
The URI type is
ghsaosv
CVE-2023-44386MEDIUM≥ 4.83.2, < 4.84.22023-10-05
CVE-2023-44386 [MEDIUM] CWE-231 Vapor's incorrect request error handling triggers server crash
Vapor's incorrect request error handling triggers server crash
Vapor incorrectly handles errors encountered during parsing of HTTP 1.x requests, triggering a precondition failure in swift-nio due to API misuse and causing immediate termination of the server process.
### Impact
This is a denial of service vulnerability, impacting all users of affected versions of Vapor. Because the crash is an explici
ghsaosv
CVE-2021-32742MEDIUM≥ 0, < 4.47.22023-06-09
CVE-2021-32742 [MEDIUM] CWE-502 Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
### Impact
A bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this func
ghsaosv
CVE-2021-21328MEDIUM≥ 0, < 4.40.12023-06-09
CVE-2021-21328 [MEDIUM] CWE-400 Vapor's Metrics integration could cause a system drain
Vapor's Metrics integration could cause a system drain
### Impact
This is a DoS attack against anyone who Bootstraps a metrics backend for their Vapor app with the following attack vector:
1. send unlimited requests against a vapor instance with different paths. this will create “unlimited” counters and timers, which will eventually drain the system.
2. downstream services might suffer from this attack as we
ghsaosv
CVE-2020-15230MEDIUM≥ 4.0.0-rc.2.5, < 4.29.42023-06-09
CVE-2020-15230 [MEDIUM] CWE-22 Arbitrary file read using percent-encoded relative paths in FileMiddleware
Arbitrary file read using percent-encoded relative paths in FileMiddleware
### Impact
Attackers can access data at arbitrary filesystem paths on the same host as an application using `FileMiddleware`.
### Patches
Version [4.29.4](https://github.com/vapor/vapor/releases/tag/4.29.4)
### Workarounds
Upgrade to 4.24.4 or later, or disable `FileMiddleware`.
### References
* Introduced in
ghsaosv
CVE-2022-31005HIGH≥ 0, < 4.60.32023-06-07
CVE-2022-31005 [HIGH] CWE-190 Vapor vulnerable to denial of service in HTTP Range Request of FileMiddleware
Vapor vulnerable to denial of service in HTTP Range Request of FileMiddleware
Vapor is an HTTP web framework for Swift and [middleware](https://docs.vapor.codes/advanced/middleware/) is a logic chain between the client and a Vapor route handler. [FileMiddleware](https://docs.vapor.codes/advanced/middleware/#file-middleware) enables the serving of assets from the Public folder of a project
ghsaosv
CVE-2022-31019HIGH≥ 0, < 4.61.12023-06-07
CVE-2022-31019 [HIGH] CWE-120 Vapor vulnerable to denial of service in URLEncodedFormDecoder
Vapor vulnerable to denial of service in URLEncodedFormDecoder
Vapor is an HTTP web framework for Swift. Vapor versions earlier than 4.61.1 are vulnerable to a denial of service in the URLEncodedFormDecoder.
### Impact
When using automatic content decoding, e.g.
```swift
app.post("foo") { request -> String in
let foo = try request.content.decode(Foo.self)
return "\(foo)"
}
```
An attacker can craft a
ghsaosv