CVE-2022-29379
Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release
Published
2022-05-25T13:15:07.837
Last Modified
2024-11-21T06:58:59.083
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 9.8 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Application |
f5
|
njs
|
0.7.3 |
Yes
|
References
-
https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1
Patch, Third Party Advisory
([email protected])
-
https://github.com/nginx/njs/issues/491
Issue Tracking, Third Party Advisory
([email protected])
-
https://github.com/nginx/njs/issues/493
Exploit, Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/nginx/njs/issues/491
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/nginx/njs/issues/493
Exploit, Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)