Lucene search

K
githubGitHub Advisory DatabaseGHSA-WHHR-7F2W-QQJ2
HistorySep 21, 2023 - 5:10 p.m.

phonenumber panics on parsing crafted RFC3966 inputs

2023-09-2117:10:57
CWE-248
CWE-392
CWE-1284
GitHub Advisory Database
github.com
13
phonenumber
parsing
vulnerability
rfc3966
crafted inputs
panic
out-of-bounds access
rust-phonenumber
network
patch
version 0.3.3+8.13.9
backport
version 0.2.5+8.11.3

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.001

Percentile

38.8%

Impact

The phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string.

In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber over the network, specifically the string .;phone-context=.

Patches

Patches will be published as version 0.3.3+8.13.9 and backported as 0.2.5+8.11.3.

Workarounds

n.a.

References

n.a.

Affected configurations

Vulners
Node
phonenumberRange0.3.00.3.3
OR
phonenumberRange<0.2.5
VendorProductVersionCPE
*phonenumber*cpe:2.3:a:*:phonenumber:*:*:*:*:*:*:*:*

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.001

Percentile

38.8%

Related for GHSA-WHHR-7F2W-QQJ2