All versions of the package node-stringbuilder are vulnerable to Out-of-bounds Read due to incorrect memory length calculation, by calling ToBuffer, ToString, or CharAt on a StringBuilder object with a non-empty string value input. It's possible to return previously allocated memory, for example, by providing negative indexes, leading to an Information Disclosure.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-NODESTRINGBUILDER-6421617 | third party advisory exploit |
https://github.com/magiclen/node-stringbuilder/blob/5c2797d3d6bf8cb6d10fe1e077609cef9a5a7de0/src/node-stringbuilder.c%23L1281 | broken link |
https://gist.github.com/dellalibera/0bb022811224f81d998fa61c3175ee67 | third party advisory exploit |