Skip to content

HTTP request with incorrect data leads to crashes

High
leodido published GHSA-wr4f-m7x5-g6x7 Apr 19, 2021

Package

Falco (Falco)

Affected versions

<0.18.0

Patched versions

0.18.0

Description

Impact

What kind of vulnerability is it? Who is impacted?

This vulnerability allows attackers to crash Falco by sending an HTTP request with malformed data. As a precondition, attackers need to have access to the webserver's port exposed by Falco.

Example:

curl http://127.0.0.1:8765/k8s-audit --data '{"kind":0}' -H "Content-Type: application/json"

Patches

Has the problem been patched? What versions should users upgrade to?

The problem has been addressed by #759 on Aug 16, 2019.

Users should upgrade to version 0.18.0 or later.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

Users who don't need to detect Kubernetes Audit Events can disable the embedded web server from the Falco configuration.

However, a version upgrade to 0.18.0 or later is strongly recommended.

References

Are there any links users can visit to find out more?

This vulnerability was initially reported in this security audit and it's identified by the ID FAL-01-003.

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

No known CVE

Weaknesses

No CWEs

Credits