CVE-2023-32731 (High) detected in grpc-protobuf-1.45.0.jar #3129
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Milestone
CVE-2023-32731 - High Severity Vulnerability
Vulnerable Library - grpc-protobuf-1.45.0.jar
gRPC: Protobuf
Path to dependency file: /data-prepper-plugins/otel-logs-source/build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.grpc/grpc-protobuf/1.45.0/f41a3849091a95af98d009294cd8572b3d152a43/grpc-protobuf-1.45.0.jar
Dependency Hierarchy:
Found in HEAD commit: 90bdaa7e7833bdd504c817e49d4434b4d8880f56
Found in base branch: main
Vulnerability Details
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in grpc/grpc#33005 grpc/grpc#33005
Publish Date: 2023-06-09
URL: CVE-2023-32731
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-cfgp-2977-2fmm
Release Date: 2023-06-09
Fix Resolution: grpc- 1.53.0;grpcio- 1.53.0;io.grpc:grpc-protobuf:1.53.0
The text was updated successfully, but these errors were encountered: