Описание
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the GenericReader::ParseNumber()
function of include/rapidjson/reader.h
when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
A flaw was found in rapidjson. Processing a crafted JSON text from a stream can cause an integer overflow in the GenericReader::ParseNumber function in the include/rapidjson/reader.h file, resulting in escalation of privileges.
Отчет
Exploiting this flaw requires an attacker tricking a user into processing or parsing malicious JSON text. As this vulnerability requires user interaction, it has been rated with a moderate severity.
Меры по смягчению последствий
Do not process or parse untrusted JSON text with rapidjson.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux AI (RHEL AI) | rapidjson | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/mcg-core-rhel8 | Not affected | ||
Red Hat OpenStack Platform 17.1 | leatherman | Will not fix |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
7.8 High
CVSS3
Связанные уязвимости
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
Github: CVE-2024-38517 TenCent RapidJSON Elevation of Privilege Vulnerability
Tencent RapidJSON is vulnerable to privilege escalation due to an inte ...
Уязвимость функции GenericReader::ParseNumber() библиотеки для обработки JSON-файлов RapidJSON операционных систем Windows, позволяющая нарушителю повысить свои привилегии
EPSS
7.8 High
CVSS3