rvvergara / expensify

1 stars 0 forks source link

CVE-2023-32732 (Medium) detected in grpcv1.20.0 #239

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-32732 - Medium Severity Vulnerability

Vulnerable Library - grpcv1.20.0

The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)

Library home page: https://github.com/grpc/grpc.git

Found in base branch: master

Vulnerable Source Files (2)

/node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/hpack_parser.cc /node_modules/grpc/deps/grpc/src/core/ext/transport/chttp2/transport/internal.h

Vulnerability Details

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url

Publish Date: 2023-06-09

URL: CVE-2023-32732

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-06-09

Fix Resolution: v1.53.0


Step up your Open Source Security Game with Mend here