Vulnerability Details : CVE-2022-29379
Potential exploit
Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release
Products affected by CVE-2022-29379
- cpe:2.3:a:f5:njs:0.7.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-29379
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-29379
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-29379
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-29379
-
https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1
Fixed typo while calculating module path length. · nginx/njs@ab1702c · GitHubPatch;Third Party Advisory
-
https://github.com/nginx/njs/issues/493
[Fixed] njs 0.7.3 was discovered to contain a stack-buffer-overflow bug in njs_default_module_loader · Issue #493 · nginx/njs · GitHubExploit;Issue Tracking;Patch;Third Party Advisory
-
https://github.com/nginx/njs/issues/491
Found a possible security concern · Issue #491 · nginx/njs · GitHubIssue Tracking;Third Party Advisory
Jump to