CVE-2024-57068
📋 TL;DR
This CVE describes a prototype pollution vulnerability in the @tanstack/form-core library that allows attackers to cause Denial of Service (DoS) by submitting specially crafted payloads. Applications using vulnerable versions of this form library are affected, particularly web applications that process user input through form submissions.
💻 Affected Systems
- @tanstack/form-core
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete application unavailability due to resource exhaustion or crash from malicious payloads, potentially affecting all users.
Likely Case
Application instability or temporary unavailability for users submitting malicious form data, requiring restart or intervention.
If Mitigated
Minimal impact with proper input validation and rate limiting in place, though some performance degradation possible.
🎯 Exploit Status
Exploitation requires understanding of prototype pollution and ability to submit crafted payloads to vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v0.35.1 or later
Vendor Advisory: https://github.com/TanStack/form/releases
Restart Required: No
Instructions:
1. Update @tanstack/form-core to v0.35.1 or later using npm update @tanstack/form-core. 2. Verify no breaking changes in your implementation. 3. Test form functionality thoroughly.
🔧 Temporary Workarounds
Input Validation
allImplement strict input validation and sanitization for all form submissions to reject malformed payloads.
Rate Limiting
allImplement rate limiting on form submission endpoints to reduce impact of DoS attempts.
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to detect and block prototype pollution patterns
- Monitor application performance metrics and set alerts for abnormal resource usage patterns
🔍 How to Verify
Check if Vulnerable:
Check package.json for @tanstack/form-core version 0.35.0
Check Version:
npm list @tanstack/form-core
Verify Fix Applied:
Verify @tanstack/form-core version is 0.35.1 or later in package.json and node_modules
📡 Detection & Monitoring
Log Indicators:
- Unusually large form submissions
- Application crashes or restarts after form submissions
- High memory or CPU usage spikes
Network Indicators:
- Multiple rapid form submissions from single IPs
- Unusual payload sizes in POST requests
SIEM Query:
source=application_logs AND ("form submission" OR "mutateMergeDeep") AND (error OR crash OR timeout)