漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Denial of service by abusing `fetchOptions.retry` in nuxt-api-party
Vulnerability Description
`nuxt-api-party` is an open source module to proxy API requests. The library allows the user to send many options directly to `ofetch`. There is no filter on which options are available. We can abuse the retry logic to cause the server to crash from a stack overflow. fetchOptions are obtained directly from the request body. A malicious user can construct a URL known to not fetch successfully, then set the retry attempts to a high value, this will cause a stack overflow as ofetch error handling works recursively resulting in a denial of service. This issue has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should limit ofetch options.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未经控制的递归
Vulnerability Title
nuxt-api-party 代码问题漏洞
Vulnerability Description
nuxt-api-party是Johann Schopplich个人开发者的一个开源模块,用于代理API请求。 nuxt-api-party 0.21.3及版本存在代码问题漏洞,该漏洞源于允许用户滥用重试逻辑,导致服务器因堆栈溢出而崩溃。
CVSS Information
N/A
Vulnerability Type
N/A