CVE-2024-57068

7.5 HIGH

📋 TL;DR

This CVE describes a prototype pollution vulnerability in the @tanstack/form-core library that allows attackers to cause Denial of Service (DoS) by submitting specially crafted payloads. Applications using vulnerable versions of this form library are affected, particularly web applications that process user input through form submissions.

💻 Affected Systems

Products:
  • @tanstack/form-core
Versions: v0.35.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using the lib.mutateMergeDeep function with user-controlled input.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application unavailability due to resource exhaustion or crash from malicious payloads, potentially affecting all users.

🟠

Likely Case

Application instability or temporary unavailability for users submitting malicious form data, requiring restart or intervention.

🟢

If Mitigated

Minimal impact with proper input validation and rate limiting in place, though some performance degradation possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of prototype pollution and ability to submit crafted payloads to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.35.1 or later

Vendor Advisory: https://github.com/TanStack/form/releases

Restart Required: No

Instructions:

1. Update @tanstack/form-core to v0.35.1 or later using npm update @tanstack/form-core. 2. Verify no breaking changes in your implementation. 3. Test form functionality thoroughly.

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation and sanitization for all form submissions to reject malformed payloads.

Rate Limiting

all

Implement rate limiting on form submission endpoints to reduce impact of DoS attempts.

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to detect and block prototype pollution patterns
  • Monitor application performance metrics and set alerts for abnormal resource usage patterns

🔍 How to Verify

Check if Vulnerable:

Check package.json for @tanstack/form-core version 0.35.0

Check Version:

npm list @tanstack/form-core

Verify Fix Applied:

Verify @tanstack/form-core version is 0.35.1 or later in package.json and node_modules

📡 Detection & Monitoring

Log Indicators:

  • Unusually large form submissions
  • Application crashes or restarts after form submissions
  • High memory or CPU usage spikes

Network Indicators:

  • Multiple rapid form submissions from single IPs
  • Unusual payload sizes in POST requests

SIEM Query:

source=application_logs AND ("form submission" OR "mutateMergeDeep") AND (error OR crash OR timeout)

🔗 References

📤 Share & Export