An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS1wamozLWo1ajYtcWoyN84ABKWL

High CVSS: 7.1 EPSS: 0.00095% (0.27469 Percentile) EPSS:

HAX CMS NodeJS Application Has Improper Error Handling That Leads to Denial of Service

Affected Packages Affected Versions Fixed Versions
npm:@haxtheweb/haxcms-nodejs < 11.0.9 11.0.9
0 Dependent packages
0 Dependent repositories
1,590 Downloads last month

Affected Version Ranges

All affected versions

0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.0.10, 0.0.11, 0.0.12, 0.0.13, 0.0.14, 0.0.15, 0.0.16, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.0.11, 9.0.12, 9.0.13, 9.0.14, 9.0.15, 9.0.16, 9.0.17, 9.0.18, 9.0.19, 9.0.20, 9.0.21, 10.0.0, 10.0.1, 10.0.3, 10.0.4, 10.0.5, 10.0.6, 11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.0.4, 11.0.6, 11.0.7, 11.0.8

All unaffected versions

11.0.9, 11.0.10, 11.0.11, 11.0.12, 11.0.13, 11.0.14, 11.0.15

Summary

The HAX CMS NodeJS application crashes when an authenticated attacker provides an API request lacking required URL parameters. This vulnerability affects the listFiles and saveFiles endpoints.

Details

This vulnerability exists because the application does not properly handle exceptions which occur as a result of changes to user-modifiable URL parameters.

Affected Resources

listFiles.js:22 listFiles()
saveFile.js:52 saveFile()
• system/api/listFiles
• system/api/saveFile

PoC

  1. Targeting an instance of instance of HAX CMS NodeJS, send a request without parameters to listFiles or saveFiles. The following screenshot shows the request in Burp Suite.
    listfilesrequest

  2. The server will crash with ERR_INVALID_ARG_TYPE.
    listfilescrash

Impact

An authenticated attacker can deny access to the HAX CMS NodeJS application by crashing the backend server. This prevents all users from accessing the backend system. If the backend system is hosting websites, those websites will be unavailable.

References: