arabaske / Ceres

0 stars 0 forks source link

CVE-2023-32732 (Medium) detected in grpcv1.10.1 #210

Open mend-bolt-for-github[bot] opened 6 months ago

mend-bolt-for-github[bot] commented 6 months ago

CVE-2023-32732 - Medium Severity Vulnerability

Vulnerable Library - grpcv1.10.1

The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)

Library home page: https://github.com/grpc/grpc.git

Found in HEAD commit: b31d728670f7b1cea140b9a346bf71d1a9771fb2

Found in base branch: clean_branch

Vulnerable Source Files (3)

/node_modules/@firebase/firestore/node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/parsing.cc /node_modules/@firebase/firestore/node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/parsing.cc /functions/node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/hpack_parser.cc

Vulnerability Details

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url

Publish Date: 2023-06-09

URL: CVE-2023-32732

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-06-09

Fix Resolution: v1.53.0


Step up your Open Source Security Game with Mend here