Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-37279
HistorySep 20, 2023 - 9:27 p.m.

CVE-2023-37279 Faktory Web Dashboard can lead to denial of service(DOS) via malicious user input

2023-09-2021:27:22
CWE-770
CWE-789
GitHub_M
github.com
1
cve-2023-37279
faktory web
denial of service

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

33.2%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param days. The vulnerability is related to how the backend reads the days URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:contribsys:faktory:*:*:*:*:*:*:*:*"
    ],
    "vendor": "contribsys",
    "product": "faktory",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.8.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

33.2%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-37279