CVE-2024-35194 (GCVE-0-2024-35194)
Vulnerability from cvelistv5 – Published: 2024-05-20 20:44 – Updated: 2024-08-02 03:07
VLAI?
Title
Stacklok Minder vulnerable to denial of service from maliciously crafted templates
Summary
Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50.
Severity ?
5.3 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-35194",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T14:26:28.547364Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:33:46.370Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T03:07:46.859Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27"
},
{
"name": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "minder",
"vendor": "stacklok",
"versions": [
{
"status": "affected",
"version": "\u003c 0.0.50"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400: Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-20T20:44:10.562Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27"
},
{
"name": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892"
}
],
"source": {
"advisory": "GHSA-crgc-2583-rw27",
"discovery": "UNKNOWN"
},
"title": "Stacklok Minder vulnerable to denial of service from maliciously crafted templates"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-35194",
"datePublished": "2024-05-20T20:44:10.562Z",
"dateReserved": "2024-05-10T14:24:24.342Z",
"dateUpdated": "2024-08-02T03:07:46.859Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50.\"}, {\"lang\": \"es\", \"value\": \"Minder es una plataforma de seguridad de la cadena de suministro de software. Antes de la versi\\u00f3n 0.0.50, el motor Minder es susceptible a una denegaci\\u00f3n de servicio por agotamiento de la memoria que puede desencadenarse a partir de plantillas creadas con fines malintencionados. El motor Minder utiliza plantillas para generar cadenas para diversos casos de uso, como URL, mensajes para solicitudes de extracci\\u00f3n y descripciones para avisos. En algunos casos, el usuario puede controlar tanto la plantilla como sus par\\u00e1metros y, en un subconjunto de estos casos, Minder lee la plantilla generada por completo en la memoria. Cuando las plantillas de Minders cumplen ambas condiciones, un atacante puede generar plantillas lo suficientemente grandes como para que Minder agote la memoria y falle. Esta vulnerabilidad se solucion\\u00f3 en 0.0.50.\"}]",
"id": "CVE-2024-35194",
"lastModified": "2024-11-21T09:19:54.380",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}]}",
"published": "2024-05-20T21:15:09.773",
"references": "[{\"url\": \"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-35194\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-05-20T21:15:09.773\",\"lastModified\":\"2024-11-21T09:19:54.380\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50.\"},{\"lang\":\"es\",\"value\":\"Minder es una plataforma de seguridad de la cadena de suministro de software. Antes de la versi\u00f3n 0.0.50, el motor Minder es susceptible a una denegaci\u00f3n de servicio por agotamiento de la memoria que puede desencadenarse a partir de plantillas creadas con fines malintencionados. El motor Minder utiliza plantillas para generar cadenas para diversos casos de uso, como URL, mensajes para solicitudes de extracci\u00f3n y descripciones para avisos. En algunos casos, el usuario puede controlar tanto la plantilla como sus par\u00e1metros y, en un subconjunto de estos casos, Minder lee la plantilla generada por completo en la memoria. Cuando las plantillas de Minders cumplen ambas condiciones, un atacante puede generar plantillas lo suficientemente grandes como para que Minder agote la memoria y falle. Esta vulnerabilidad se solucion\u00f3 en 0.0.50.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"references\":[{\"url\":\"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\", \"name\": \"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\", \"name\": \"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:07:46.859Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-35194\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-21T14:26:28.547364Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-21T14:26:51.319Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"Stacklok Minder vulnerable to denial of service from maliciously crafted templates\", \"source\": {\"advisory\": \"GHSA-crgc-2583-rw27\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"stacklok\", \"product\": \"minder\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 0.0.50\"}]}], \"references\": [{\"url\": \"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\", \"name\": \"https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\", \"name\": \"https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-05-20T20:44:10.562Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-35194\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T03:07:46.859Z\", \"dateReserved\": \"2024-05-10T14:24:24.342Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-05-20T20:44:10.562Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…