Description
msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1. Exploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue.
Remediation
References
https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx
https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602
Related Vulnerabilities
CVE-2015-8854 Vulnerability in npm package marked
CVE-2013-1966 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2013-7397 Vulnerability in maven package com.ning:async-http-client
CVE-2022-41239 Vulnerability in maven package com.groupon.jenkins-ci.plugins:dotci
CVE-2015-2912 Vulnerability in maven package com.orientechnologies:orientdb-server