GHSA-JRJW-QGR2-WFCG

Vulnerability from github – Published: 2023-06-23 21:37 – Updated: 2023-06-23 21:37
VLAI?
Summary
YARP Denial of Service Vulnerability
Details

Impact

A denial of service vulnerability exists in YARP.

Patches

If you're using YARP 1.x, you should update to NuGet package version 1.1.2. If you're using YARP 2.0.0, you should update to NuGet package version 2.0.1.

You can do so by updating the PackageReference in your .csproj file

<ItemGroup>
- <PackageReference Include="Yarp.ReverseProxy" Version="2.0.0" />
- <PackageReference Include="Yarp.Telemetry.Consumption" Version="2.0.0" />
+ <PackageReference Include="Yarp.ReverseProxy" Version="2.0.1" />
+ <PackageReference Include="Yarp.Telemetry.Consumption" Version="2.0.1" />
</ItemGroup>

or by selecting 2.0.1 in the NuGet UI inside Visual Studio (Manage NuGet Packages / Updates)

References

CVE-2023-33141

Show details on source website

{
  "affected": [
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c= 1.1.1"
      },
      "package": {
        "ecosystem": "NuGet",
        "name": "Yarp.ReverseProxy"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.1.2"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "NuGet",
        "name": "Yarp.ReverseProxy"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "2.0.0"
            },
            {
              "fixed": "2.0.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ],
      "versions": [
        "2.0.0"
      ]
    }
  ],
  "aliases": [
    "CVE-2023-33141"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-400"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2023-06-23T21:37:26Z",
    "nvd_published_at": "2023-06-23T02:15:09Z",
    "severity": "HIGH"
  },
  "details": "### Impact\nA denial of service vulnerability exists in YARP.\n\n### Patches\nIf you\u0027re using YARP 1.x, you should update to NuGet package version [1.1.2](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.2).\nIf you\u0027re using YARP 2.0.0, you should update to NuGet package version [2.0.1](https://www.nuget.org/packages/Yarp.ReverseProxy/2.0.1).\n\n\nYou can do so by updating the `PackageReference` in your `.csproj` file\n```diff\n\u003cItemGroup\u003e\n- \u003cPackageReference Include=\"Yarp.ReverseProxy\" Version=\"2.0.0\" /\u003e\n- \u003cPackageReference Include=\"Yarp.Telemetry.Consumption\" Version=\"2.0.0\" /\u003e\n+ \u003cPackageReference Include=\"Yarp.ReverseProxy\" Version=\"2.0.1\" /\u003e\n+ \u003cPackageReference Include=\"Yarp.Telemetry.Consumption\" Version=\"2.0.1\" /\u003e\n\u003c/ItemGroup\u003e\n```\nor by selecting `2.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`)\n\n### References\n\n[CVE-2023-33141](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141)\n",
  "id": "GHSA-jrjw-qgr2-wfcg",
  "modified": "2023-06-23T21:37:26Z",
  "published": "2023-06-23T21:37:26Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-jrjw-qgr2-wfcg"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33141"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/microsoft/reverse-proxy"
    },
    {
      "type": "WEB",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33141"
    },
    {
      "type": "WEB",
      "url": "https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.2"
    },
    {
      "type": "WEB",
      "url": "https://www.nuget.org/packages/Yarp.ReverseProxy/2.0.1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ],
  "summary": "YARP Denial of Service Vulnerability"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…