thrift is vulnerable to Uncontrolled Recursion
75
High Risk
The Node.js library exposes deserialization helpers that call skip() while advancing over unknown Thrift fields. For hostile messages, that path could recurse without an effective bound tied to untrusted structure. Processing such input could exhaust the JavaScript call stack and terminate the process handling the connection. The corrected behavior constrains that traversal so depth cannot grow without bound for attacker-controlled payloads.
You are affected if you are using a version that falls within the vulnerable range.
thrift is vulnerable to Uncontrolled Recursion in versions 0.2.1 - 0.22.0.
Upgrade the thrift library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant