Buffer Overflow Vulnerability in nginx njs by NGINX
CVE-2022-27008
7.5HIGH
Summary
The nginx njs version 0.7.2 is susceptible to a buffer overflow vulnerability caused by a type confusion in the Array.prototype.concat() method. This issue arises when a slow array appends an element to a fast array, potentially leading to unexpected behavior and security risks. Users are advised to review the related security advisories and update to patched versions to mitigate potential effects.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved