gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url
CVE-2023-32732 - Medium Severity Vulnerability
Vulnerable Library - grpcv1.19.0
The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)
Library home page: https://github.com/grpc/grpc.git
Found in HEAD commit: c3cd6cae7b9d63bab344ee98f6fcc5f6ecf18f07
Found in base branch: master
Vulnerable Source Files (3)
/node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/parsing.cc /node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/parsing.cc /node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/hpack_parser.cc
Vulnerability Details
gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url
Publish Date: 2023-06-09
URL: CVE-2023-32732
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2023-06-09
Fix Resolution: v1.53.0
Step up your Open Source Security Game with Mend here