Miggo Logo

CVE-2021-32013: Denial of Service in SheetsJS Pro

5.5

CVSS Score
3.1

Basic Information

EPSS Score
0.43886%
Published
7/22/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
xlsxnpm< 0.17.00.17.0
org.webjars.npm:xlsxmaven< 0.17.00.17.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from uncontrolled resource consumption during .xlsx parsing. While the provided patches don't show core library changes, analysis of XLSX format structure and common vulnerability patterns suggests worksheet parsing functions (parse_ws_xml) and shared string handling (parse_shared_strings) are likely candidates. The read function is included as the entry point but with lower confidence. The actual fix in v0.17.0 likely added memory safeguards in these core parsing routines.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

S***tJS Pro t*rou** *.**.* *llows *tt**k*rs to **us* * **ni*l o* s*rvi** (m*mory *onsumption) vi* * *r**t** .xlsx *o*um*nt t**t is mis**n*l** w**n r*** *y xlsx.js (issu* * o* *).

Reasoning

T** vuln*r**ility st*ms *rom un*ontroll** r*sour** *onsumption *urin* .xlsx p*rsin*. W*il* t** provi*** p*t***s *on't s*ow *or* li*r*ry ***n**s, *n*lysis o* XLSX *orm*t stru*tur* *n* *ommon vuln*r**ility p*tt*rns su***sts works***t p*rsin* *un*tions