When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005
References
Link | Resource |
---|---|
https://github.com/grpc/grpc/pull/32309 | Patch |
https://github.com/grpc/grpc/pull/33005 | Patch |
https://github.com/grpc/grpc/pull/32309 | Patch |
https://github.com/grpc/grpc/pull/33005 | Patch |
Configurations
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/grpc/grpc/pull/32309 - Patch | |
References | () https://github.com/grpc/grpc/pull/33005 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
15 Jun 2023, 22:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Grpc grpc
Grpc |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://github.com/grpc/grpc/pull/32309 - Patch | |
References | (MISC) https://github.com/grpc/grpc/pull/33005 - Patch | |
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:* |
13 Jun 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 |
09 Jun 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-09 11:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32731
Mitre link : CVE-2023-32731
CVE.ORG link : CVE-2023-32731
JSON object : View
Products Affected
grpc
- grpc
CWE