The deserialize function in serialize-to-js through 1.1.1 allows attackers to cause a denial of service via vectors involving an Immediately Invoked Function Expression "function()" substring, as demonstrated by a "function(){console.log(" call or a simple infinite loop. NOTE: the vendor agrees that denial of service can occur but notes that deserialize is explicitly listed as "harmful" within the README.md file
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://kay-malwarebenchmark.github.io/blog/cve-2017-15871-dos-through-iife/ | exploit third party advisory broken link |
https://github.com/commenthol/serialize-to-js/issues/3 | issue tracking third party advisory broken link |