First published: Wed Jun 14 2023(Updated: )
A debug function in the lua-resty-json package, up to commit id 3ef9492bd3a44d9e51301d6adc3cd1789c8f534a (merged in PR #14) contained an out of bounds access bug that could have allowed an attacker to launch a DoS if the function was used to parse untrusted input data. It is important to note that because this debug function was only used in tests and demos, it was not exploitable in a normal environment.
Credit: cna@cloudflare.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudflare Lua-resty-json | <2023-05-05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3040 is a vulnerability in the lua-resty-json package that could allow an attacker to launch a Denial of Service attack if the debug function is used with untrusted input data.
The severity of CVE-2023-3040 is high, with a severity value of 7.5.
An attacker can exploit CVE-2023-3040 by using the debug function of the lua-resty-json package with malicious input data, which can lead to a Denial of Service attack.
Yes, Cloudflare has fixed the vulnerability in the lua-resty-json package. It is recommended to update to a version released after May 5, 2023.
More information about CVE-2023-3040 can be found in the Cloudflare lua-resty-json GitHub repository and the associated security advisories.