Files
CVEs-PoC/2021/CVE-2021-32823.md
2025-09-29 21:09:30 +02:00

19 lines
987 B
Markdown

### [CVE-2021-32823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32823)
![](https://img.shields.io/static/v1?label=Product&message=bindata&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%202.4.10%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%20Uncontrolled%20Resource%20Consumption&color=brightgreen)
### Description
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xfschott/CVE-search
- https://github.com/ARPSyndicate/cvemon