CVE-2024-57084

7.5 HIGH

📋 TL;DR

This CVE describes a prototype pollution vulnerability in dot-properties v1.0.1's lib.parse function that allows attackers to cause Denial of Service (DoS) by submitting specially crafted payloads. The vulnerability affects applications using this specific version of the dot-properties library to parse property files. Attackers can exploit this to crash applications or degrade service availability.

💻 Affected Systems

Products:
  • dot-properties
Versions: v1.0.1 only
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that use the vulnerable lib.parse function with untrusted input

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application/service outage resulting in extended downtime and business disruption

🟠

Likely Case

Application crashes or becomes unresponsive, requiring restart and causing temporary service disruption

🟢

If Mitigated

Minimal impact with proper input validation and monitoring in place

🌐 Internet-Facing: HIGH - Any application parsing untrusted property files from external sources is vulnerable
🏢 Internal Only: MEDIUM - Internal applications processing property files could be exploited by authenticated users

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to submit crafted property files to the vulnerable parsing function

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.0.2 or later

Vendor Advisory: https://github.com/grncdr/js-dot-properties/security/advisories

Restart Required: No

Instructions:

1. Update dot-properties dependency to v1.0.2 or later
2. Run 'npm update dot-properties' or 'yarn upgrade dot-properties'
3. Test application functionality with updated library

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation for property files before passing to lib.parse function

Rate Limiting

all

Implement rate limiting on endpoints that accept property file uploads

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious property file patterns
  • Isolate vulnerable services in network segments with restricted access

🔍 How to Verify

Check if Vulnerable:

Check package.json or package-lock.json for dot-properties version 1.0.1

Check Version:

npm list dot-properties | grep dot-properties

Verify Fix Applied:

Verify dot-properties version is 1.0.2 or later in package.json

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or restarts after processing property files
  • Unusual memory consumption spikes
  • Error logs containing prototype pollution related messages

Network Indicators:

  • Multiple failed parsing attempts from single source
  • Unusually large property file uploads

SIEM Query:

source="application.logs" AND ("prototype pollution" OR "lib.parse error" OR "dot-properties crash")

🔗 References

📤 Share & Export