raindigi / cloudcannon-suite

:couch_and_lamp: An opinionated set of tools to build and maintain static sites
https://suite.cloudcannon.com/
0 stars 0 forks source link

CVE-2023-32732 (Medium) detected in grpcv1.19.0 #143

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-32732 - Medium Severity Vulnerability

Vulnerable Library - grpcv1.19.0

The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)

Library home page: https://github.com/grpc/grpc.git

Found in HEAD commit: c3cd6cae7b9d63bab344ee98f6fcc5f6ecf18f07

Found in base branch: master

Vulnerable Source Files (3)

/node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/parsing.cc /node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/parsing.cc /node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/hpack_parser.cc

Vulnerability Details

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url

Publish Date: 2023-06-09

URL: CVE-2023-32732

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-06-09

Fix Resolution: v1.53.0


Step up your Open Source Security Game with Mend here