Skip to content

Commit 9fdcc2b

Browse files
New Vuln: UAF in sonic-rs
1 parent b4f16fc commit 9fdcc2b

File tree

1 file changed

+21
-12
lines changed

1 file changed

+21
-12
lines changed

input/new.json

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,24 @@
11
{
2-
"package_name": "",
3-
"patch_versions": [],
4-
"vulnerable_ranges": [],
5-
"cwe": [],
6-
"tldr": "",
7-
"doest_this_affect_me": "",
8-
"how_to_fix": "",
9-
"vulnerable_to": "",
2+
"package_name": "sonic-rs",
3+
"patch_versions": [
4+
"0.5.2"
5+
],
6+
"vulnerable_ranges": [
7+
[
8+
"0.3.0",
9+
"0.5.1"
10+
]
11+
],
12+
"cwe": [
13+
"CWE-416"
14+
],
15+
"tldr": "Affected versions of this package have a Use-After-Free vulnerability in the `into_object_iter` function. If the `ObjectJsonIter` is dropped prematurely, borrowed keys become dangling pointers to freed memory. Accessing these keys can result in undefined behavior, including segmentation faults or data leaks. An attacker can exploit this by using crafted JSON input to retain keys after the iterator is destroyed, potentially causing crashes or enabling remote code execution.",
16+
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
17+
"how_to_fix": "Upgrade the `sonic-rs` library to the patch version.",
18+
"vulnerable_to": "Use After Free",
1019
"related_cve_id": "",
11-
"language": "",
12-
"severity_class": "",
13-
"aikido_score": 0,
14-
"changelog": ""
20+
"language": "RUST",
21+
"severity_class": "HIGH",
22+
"aikido_score": 72,
23+
"changelog": "https://github.com/cloudwego/sonic-rs/releases/tag/0.5.2"
1524
}

0 commit comments

Comments
 (0)