GMS-2023-3788

SOURCE - gitlab

Summary

Impact

In affected releases of gRPC-Go, it is possible for an attacker to send HTTP/2 requests, cancel them, and send subsequent requests, which is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit.

Patches

This vulnerability was addressed by #6703 and has been included in patch releases: 1.56.3, 1.57.1, 1.58.3. It is also included in the latest release, 1.59.0.

Along with applying the patch, users should also ensure they are using the grpc.MaxConcurrentStreams server option to apply a limit to the server's resources used for any single connection.

Workarounds

None.

References

#6703

Common Weakness Enumeration (CWE)

SOURCE - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities


GitLab

CREATED


UPDATED


SOURCE ID

GMS-2023-3788


EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

N/Aunspecified
PackageTypeOS NameOS VersionAffected RangesFix Versions
google.golang.org/grpcgolang--<1.56.31.56.3, 1.57.1, 1.58.3
google.golang.org/grpcgolang-->=1.57.0,<1.57.11.56.3, 1.57.1, 1.58.3
google.golang.org/grpcgolang-->=1.58.0,<1.58.31.56.3, 1.57.1, 1.58.3

CVSS:2 Severity and metrics

No CVSS data available from this source.