Vulnerability Name: | CVE-2021-32012 (CCN-205689) | ||||||||||||
Assigned: | 2021-05-03 | ||||||||||||
Published: | 2021-05-03 | ||||||||||||
Updated: | 2022-02-28 | ||||||||||||
Summary: | SheetJS and SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2). | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32012 Source: XF Type: UNKNOWN sheetjs-cve202132012-dos(205689) Source: CCN Type: FloQast Web site Fuzzing and Parsing Securely Source: MISC Type: Third Party Advisory https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/ Source: CCN Type: SheetJS Web site SheetJS Pro Source: MISC Type: Product, Vendor Advisory https://sheetjs.com/pro Source: MISC Type: Product, Third Party Advisory https://www.npmjs.com/package/xlsx/v/0.17.0 Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2022.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||
BACK |