Vulnerability Details : CVE-2021-31875
** DISPUTED ** In mjs_json.c in Cesanta MongooseOS mJS 1.26, a maliciously formed JSON string can trigger an off-by-one heap-based buffer overflow in mjs_json_parse, which can potentially lead to redirection of control flow. NOTE: the original reporter disputes the significance of this finding because "there isn’t very much of an opportunity to exploit this reliably for an information leak, so there isn’t any real security impact."
Vulnerability category: OverflowMemory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2021-31875
Probability of exploitation activity in the next 30 days: 0.48%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 72 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2021-31875
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
[email protected] |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
CWE ids for CVE-2021-31875
-
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.Assigned by: [email protected] (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: [email protected] (Primary)
References for CVE-2021-31875
-
https://github.com/418sec/mjs/pull/2
Patch;Third Party Advisory
-
https://huntr.dev/bounties/1-other-mjs/
Exploit;Third Party Advisory
-
https://github.com/cesanta/mjs/releases/tag/1.26
Release Notes;Third Party Advisory
Products affected by CVE-2021-31875
- cpe:2.3:a:cesanta:mongooseos_mjs:1.26:*:*:*:*:*:*:*