CVE-2022-31019

HIGH

Vapor - Buffer Overflow

Title source: llm
STIX 2.1

Description

Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d "array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n '[_0][0][array]'; done)[string][_0]=hello%20world" http://localhost:8080/foo`. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and a process crash. This issue has been fixed in version 4.61.1.

Scores

CVSS v3 7.5
EPSS 0.0042
EPSS Percentile 61.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-674 CWE-120
Status published
Products (2)
SwiftURL/github.com/vapor/vapor 0 - 4.61.1SwiftURL
vapor/vapor < 4.61.1
Published Jun 09, 2022
Tracked Since Feb 18, 2026