Cyber Posture

CVE-2024-57083

HighPublic PoC

Published: 28 March 2025

Published
28 March 2025
Modified
14 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0010 27.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2024-57083 is a prototype pollution vulnerability in the Module.mergeObjects component, located at redoc/bundles/redoc.lib.js:2, affecting Redoc versions 2.2.0 and earlier. Published on 2025-03-28, the flaw allows attackers to cause a Denial of Service (DoS) condition by supplying a crafted payload. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is classified under CWE-1321.

The vulnerability enables remote exploitation over the network with low complexity, requiring no authentication privileges or user interaction. Attackers can trigger it by delivering a specially crafted payload to affected Redoc instances, resulting in high-impact disruption to availability while leaving confidentiality and integrity unaffected.

Mitigation details are available in the referenced GitHub issue at https://github.com/Redocly/redoc/issues/2499.

Details

CWE(s)
CWE-1321

Affected Products

redocly
redoc
≤ 2.2.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Prototype pollution enables remote exploitation of public-facing Redoc application (T1190) to trigger application-level DoS via crafted payload (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References