CVE-2021-39131

HIGH

Ced < 1.0.0 - Improper Exception Handling

Title source: rule
STIX 2.1

Description

ced detects character encoding using Google’s compact_enc_det library. In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. The problem has been patched in ced v1.0.0. As a workaround, before passing an argument to ced, verify it’s a `Buffer` using `Buffer.isBuffer(obj)`.

References (3)

Core 3
Core References
Exploit, Patch, Third Party Advisory x_refsource_confirm
https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/sonicdoe/ced/releases/tag/v1.0.0

Scores

CVSS v3 7.5
EPSS 0.0058
EPSS Percentile 68.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-755 CWE-241
Status published
Products (2)
ced_project/ced 0.1.0
npm/ced 0 - 1.0.0npm
Published Aug 17, 2021
Tracked Since Feb 18, 2026