Miggo Logo

CVE-2024-48924: MessagePack allows untrusted data to lead to DoS attack due to hash collisions and stack overflow

8.7

CVSS Score
4.0

Basic Information

EPSS Score
0.1859%
Published
10/17/2024
Updated
10/18/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Package NameEcosystemVulnerable VersionsFirst Patched Version
MessagePacknuget< 2.5.1872.5.187
MessagePacknuget>= 2.6.95-alpha, < 3.0.214-rc.13.0.214-rc.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure hash collision handling during deserialization. The workaround instructions explicitly require overriding GetHashCollisionResistantEqualityComparer<T> in MessagePackSecurity, indicating the base implementation is vulnerable. The CWE-328 (Weak Hash) alignment and prior advisory context about hash collision fixes further confirm this is the critical point where collision resistance should be enforced but wasn't adequately implemented.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t W**n t*is li*r*ry is us** to **s*ri*liz* m*ss***p**k **t* *rom *n untrust** sour**, t**r* is * risk o* * **ni*l o* s*rvi** *tt**k *y *n *tt**k*r t**t s*n*s **t* *ontriv** to pro*u** **s* *ollisions, l***in* to l*r** *PU *onsumption *ispro

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* **s* *ollision **n*lin* *urin* **s*ri*liz*tion. T** work*roun* instru*tions *xpli*itly r*quir* ov*rri*in* `**t**s**ollisionR*sist*nt*qu*lity*omp*r*r<T>` in `M*ss***P**kS**urity`, in*i**tin* t** **s* impl*m*nt*tio