Skip to main content

CVE-2022-41719: CWE 400: Uncontrolled Resource Consumption in github.com/shamaton/msgpack/v2 github.com/shamaton/msgpack/v2

High
VulnerabilityCVE-2022-41719cvecve-2022-41719
Published: Thu Nov 10 2022 (11/10/2022, 19:57:01 UTC)
Source: CVE
Vendor/Project: github.com/shamaton/msgpack/v2
Product: github.com/shamaton/msgpack/v2

Description

Unmarshal can panic on some inputs, possibly allowing for denial of service attacks.

AI-Powered Analysis

AILast updated: 07/02/2025, 03:26:01 UTC

Technical Analysis

CVE-2022-41719 is a high-severity vulnerability affecting the Go package github.com/shamaton/msgpack/v2, a library used for encoding and decoding data in the MessagePack format. The vulnerability arises from the Unmarshal function, which is responsible for deserializing MessagePack data into Go data structures. Specifically, certain crafted inputs can cause the Unmarshal function to panic, leading to uncontrolled resource consumption and potentially causing a denial of service (DoS) condition. This vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption), indicating that the software does not properly limit resource usage when processing input data. The CVSS 3.1 base score of 7.5 reflects a high severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but a high impact on availability (A:H). This means an attacker can remotely send specially crafted MessagePack data to a service using this library, causing it to crash or become unresponsive without needing authentication or user interaction. The affected versions are indicated as '0', which likely means all versions prior to a fix are vulnerable. No known exploits are reported in the wild, and no patch links are provided in the data, suggesting that users should verify the library version and monitor for updates. The vulnerability is significant because MessagePack is used in various applications for efficient data serialization, including microservices, APIs, and communication protocols. If an application uses this vulnerable library to process untrusted input, it could be disrupted by an attacker sending malicious payloads that trigger the panic, resulting in denial of service and impacting service availability.

Potential Impact

For European organizations, the primary impact of CVE-2022-41719 is the risk of denial of service attacks against applications and services that utilize the vulnerable github.com/shamaton/msgpack/v2 library for MessagePack data processing. This can lead to service outages, degraded performance, and potential disruption of business operations, especially for organizations relying on microservices architectures or APIs that use this serialization format. Critical infrastructure providers, financial institutions, and technology companies in Europe that integrate Go-based services with MessagePack serialization are particularly at risk. The availability impact could affect customer-facing services, internal communications, or automated processing pipelines. Although there is no direct confidentiality or integrity compromise, the denial of service could indirectly affect trust and compliance, especially under regulations like GDPR that mandate service availability and incident management. Additionally, the ease of exploitation (no authentication or user interaction required) increases the threat level, as attackers can remotely trigger the vulnerability over the network. Organizations with exposed APIs or services accepting MessagePack input should consider this vulnerability a significant operational risk.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Inventory all applications and services to identify usage of github.com/shamaton/msgpack/v2, particularly versions prior to any fixed release addressing CVE-2022-41719. 2) Monitor the official repository and Go vulnerability databases for patches or updates that fix this issue, and apply them promptly once available. 3) Implement input validation and filtering at the network or application layer to restrict or sanitize MessagePack inputs from untrusted sources, reducing the risk of malicious payloads triggering the panic. 4) Employ runtime monitoring and alerting to detect abnormal application crashes or panics related to MessagePack processing, enabling rapid incident response. 5) Consider deploying rate limiting and network-level protections (e.g., Web Application Firewalls) to mitigate potential denial of service attempts exploiting this vulnerability. 6) For critical services, implement redundancy and failover mechanisms to maintain availability in case of exploitation attempts. 7) Engage in secure coding practices and conduct fuzz testing on MessagePack deserialization routines to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Go
Date Reserved
2022-09-28T17:00:06.609Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed7d6

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 7/2/2025, 3:26:01 AM

Last updated: 7/27/2025, 7:08:40 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats