CVE-2023-32731
CVSS V2 None
CVSS V3 None
Description
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005
Overview
- CVE ID
- CVE-2023-32731
- Assigner
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-06-09T10:54:08.472Z
- Last Modified Date
- 2023-06-13T15:26:24.636Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/grpc/grpc/pull/32309 | |
https://github.com/grpc/grpc/pull/33005 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-32731 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32731 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 11:14:20 | Added to TrackCVE |