When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005
References
| Link | Resource |
|---|---|
| https://github.com/grpc/grpc/pull/32309 | Patch |
| https://github.com/grpc/grpc/pull/33005 | Patch |
| https://github.com/grpc/grpc/pull/32309 | Patch |
| https://github.com/grpc/grpc/pull/33005 | Patch |
Configurations
History
21 Nov 2024, 08:03
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
| References | () https://github.com/grpc/grpc/pull/32309 - Patch | |
| References | () https://github.com/grpc/grpc/pull/33005 - Patch |
15 Jun 2023, 22:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://github.com/grpc/grpc/pull/33005 - Patch | |
| References | (MISC) https://github.com/grpc/grpc/pull/32309 - Patch | |
| CWE | NVD-CWE-Other | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:* | |
| First Time |
Grpc
Grpc grpc |
13 Jun 2023, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 | |
| References |
|
09 Jun 2023, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-06-09 11:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32731
Mitre link : CVE-2023-32731
CVE.ORG link : CVE-2023-32731
JSON object : View
Products Affected
grpc
- grpc
CWE
