Description
msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1. Exploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue.
Remediation
References
https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602
https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx
Related Vulnerabilities
CVE-2020-36640 Vulnerability in maven package org.bonitasoft.connectors:bonita-connector-webservice
CVE-2017-7661 Vulnerability in maven package org.apache.cxf.fediz:fediz-spring2
CVE-2018-1000665 Vulnerability in maven package org.dojotoolkit:dojo
CVE-2019-10793 Vulnerability in npm package dot-object
CVE-2022-39322 Vulnerability in npm package @keystone-6/core