Lucene search

K
cve[email protected]CVE-2024-2689
HistoryApr 03, 2024 - 10:15 p.m.

CVE-2024-2689

2024-04-0322:15:07
CWE-20
web.nvd.nist.gov
29
denial of service
temporal server
version 1.20.5
version 1.21.6
version 1.22.7
authenticated user
workflows
invalid utf-8
crashloop
queue lag
logs
mitigation

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Denial of Service in Temporal Server prior to version 1.20.5, 1.21.6, and 1.22.7 allows an authenticated user who has permissions to interact with workflows and has crafted an invalid UTF-8 string for submission to potentially cause a crashloop. If left unchecked, the task containing the invalid UTF-8 will become stuck in the queue, causing an increase in queue lag. Eventually, all processes handling these queues will become stuck and the system will run out of resources. The workflow ID of the failing task will be visible in the logs, and can be used to remove that workflow as a mitigation. Version 1.23 is not impacted.Β In this context, a user is an operator of Temporal Server.

CNA Affected

[
  {
    "collectionURL": "https://hub.docker.com/r/temporalio/server",
    "defaultStatus": "unaffected",
    "packageName": "temporalio/server",
    "product": "Temporal Server",
    "repo": "https://github.com/temporalio/temporal",
    "vendor": "Temporal Technologies, Inc.",
    "versions": [
      {
        "lessThan": "1.20.5",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThan": "1.21.6",
        "status": "affected",
        "version": "1.21.0",
        "versionType": "semver"
      },
      {
        "lessThan": "1.22.7",
        "status": "affected",
        "version": "1.22.0",
        "versionType": "semver"
      }
    ]
  }
]

4.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2024-2689