Vapor vulnerabilities
7 known vulnerabilities affecting vapor/vapor.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2024-21631MEDIUMCVSS 6.5fixed in 4.90.02024-01-03
CVE-2024-21631 [MEDIUM] CWE-20 CVE-2024-21631: Vapor is an HTTP web framework for Swift. Prior to version 4.90.0, Vapor's `vapor_urlparser_parse` f
Vapor is an HTTP web framework for Swift. Prior to version 4.90.0, Vapor's `vapor_urlparser_parse` function uses `uint16_t` indexes when parsing a URI's components, which may cause integer overflows when parsing untrusted inputs. This vulnerability does not affect Vapor directly but could impact applications relying on the URI type for validating use
nvd
CVE-2023-44386MEDIUMCVSS 5.3≥ 4.83.2, < 4.84.2v>= 4.83.2, < 4.84.22023-10-05
CVE-2023-44386 [MEDIUM] CWE-231 CVE-2023-44386: Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all u
Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all users of affected versions of Vapor. The HTTP1 error handler closed connections when HTTP parse errors occur instead of passing them on. The issue is fixed as of Vapor release 4.84.2.
nvd
CVE-2022-31019HIGHCVSS 7.5fixed in 4.61.12022-06-09
CVE-2022-31019 [HIGH] CWE-120 CVE-2022-31019: Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker c
Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d "array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n '[_0][0][array]'; done)[string][_0]=hello%20world" http://localhost:8080/foo`. The issue is
nvd
CVE-2022-31005HIGHCVSS 7.5fixed in 4.60.32022-05-31
CVE-2022-31005 [HIGH] CWE-190 CVE-2022-31005: Vapor is an HTTP web framework for Swift. Users of Vapor prior to version 4.60.3 with FileMiddleware
Vapor is an HTTP web framework for Swift. Users of Vapor prior to version 4.60.3 with FileMiddleware enabled are vulnerable to an integer overflow vulnerability that can crash the application. Version 4.60.3 contains a patch for this issue. As a workaround, disable FileMiddleware and serve via a Content Delivery Network.
nvd
CVE-2021-32742CRITICALCVSS 9.1≤ 4.47.12021-07-09
CVE-2021-32742 [CRITICAL] CWE-502 CVE-2021-32742: Vapor is a web framework for Swift. In versions 4.47.1 and prior, bug in the `Data.init(base32Encode
Vapor is a web framework for Swift. In versions 4.47.1 and prior, bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact a
nvd
CVE-2021-21328MEDIUMCVSS 5.3≤ 4.40.02021-02-26
CVE-2021-21328 [MEDIUM] CWE-400 CVE-2021-21328: Vapor is a web framework for Swift. In Vapor before version 4.40.1, there is a DoS attack against an
Vapor is a web framework for Swift. In Vapor before version 4.40.1, there is a DoS attack against anyone who Bootstraps a metrics backend for their Vapor app. The following is the attack vector: 1. send unlimited requests against a vapor instance with different paths. this will create unlimited counters and timers, which will eventually drain the sy
nvd
CVE-2020-15230MEDIUMCVSS 6.5fixed in 4.29.42020-10-02
CVE-2020-15230 [MEDIUM] CWE-22 CVE-2020-15230: Vapor is a web framework for Swift. In Vapor before version 4.29.4, Attackers can access data at arb
Vapor is a web framework for Swift. In Vapor before version 4.29.4, Attackers can access data at arbitrary filesystem paths on the same host as an application. Only applications using FileMiddleware are affected. This is fixed in version 4.29.4.
nvd