Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-21708
HistoryJan 21, 2022 - 12:00 a.m.

CVE-2022-21708

2022-01-2100:00:00
ubuntu.com
ubuntu.com
9

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

30.9%

graphql-go is a GraphQL server with a focus on ease of use. In versions
prior to 1.3.0 there exists a DoS vulnerability that is possible due to a
bug in the library that would allow an attacker with specifically designed
queries to cause stack overflow panics. Any user with access to the GraphQL
handler can send these queries and cause stack overflows. This in turn
could potentially compromise the ability of the server to serve data to its
users. The issue has been patched in version v1.3.0. The only known
workaround for this issue is to disable the graphql.MaxDepth option from
your schema which is not recommended.

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchgolang-github-graph-gophers-graphql-go< anyUNKNOWN

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

30.9%