Lucene search

K
cvelistGoogleCVELIST:CVE-2023-32731
HistoryJun 09, 2023 - 10:54 a.m.

CVE-2023-32731 Information leak in gRPC

2023-06-0910:54:08
CWE-440
Google
www.cve.org
1
grpc
http2
hpack
information leak
privilege escalation
data exfiltration
upgrade
security vulnerability

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

0.002 Low

EPSS

Percentile

56.4%

When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained inย  https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "gRPC",
    "repo": "https://github.com/grpc",
    "vendor": "Google",
    "versions": [
      {
        "lessThanOrEqual": "1.54",
        "status": "affected",
        "version": "1.53",
        "versionType": "custom"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

0.002 Low

EPSS

Percentile

56.4%