Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-38517

Опубликовано: 09 июл. 2024
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the GenericReader::ParseNumber() function of include/rapidjson/reader.h when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

A flaw was found in rapidjson. Processing a crafted JSON text from a stream can cause an integer overflow in the GenericReader::ParseNumber function in the include/rapidjson/reader.h file, resulting in escalation of privileges.

Отчет

Exploiting this flaw requires an attacker tricking a user into processing or parsing malicious JSON text. As this vulnerability requires user interaction, it has been rated with a moderate severity.

Меры по смягчению последствий

Do not process or parse untrusted JSON text with rapidjson.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux AI (RHEL AI)rapidjsonNot affected
Red Hat Openshift Data Foundation 4odf4/mcg-core-rhel8Not affected
Red Hat OpenStack Platform 17.1leathermanWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-191
https://bugzilla.redhat.com/show_bug.cgi?id=2296854rapidjson: privilege escalation via integer underflow in GenericReader::ParseNumber()

EPSS

Процентиль: 18%
0.00057
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
nvd
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
msrc
12 месяцев назад

Github: CVE-2024-38517 TenCent RapidJSON Elevation of Privilege Vulnerability

CVSS3: 7.8
debian
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an inte ...

CVSS3: 7.8
fstec
около 1 года назад

Уязвимость функции GenericReader::ParseNumber() библиотеки для обработки JSON-файлов RapidJSON операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 18%
0.00057
Низкий

7.8 High

CVSS3