CVE-2023-32731 Vulnerability Details

  /     /     /  

CVE-2023-32731 Metadata Quick Info

CVE Published: 09/06/2023 | CVE Updated: 26/09/2024 | CVE Year: 2023
Source: Google | Vendor: Google | Product: gRPC
Status : PUBLISHED

CVE-2023-32731 Description

When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005

Metrics

CVSS Version: 3.1 | Base Score: 7.4 HIGH
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* HIGH
    Privileges Required (PR)* NONE
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* NONE
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-440
CWE Name: CWE-440: Expected Behavior Violation
Source: Google

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-220
CAPEC Description: CAPEC-220 Client-Server Protocol Manipulation


Source: NVD (National Vulnerability Database).