Description
msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1. Exploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue.
Remediation
References
https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602
https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx
Related Vulnerabilities
CVE-2023-49674 Vulnerability in maven package io.jenkins.plugins:neuvector-vulnerability-scanner
CVE-2023-31101 Vulnerability in maven package org.apache.inlong:manager-dao
CVE-2016-2171 Vulnerability in maven package org.apache.portals.jetspeed-2:jetspeed-security
CVE-2021-23446 Vulnerability in npm package handsontable
CVE-2019-10742 Vulnerability in maven package org.webjars.bowergithub.axios:axios