gsd-2022-43756
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
A Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in SUSE Rancher allows remote attackers to cause denial of service by supplying specially crafted git credentials. This issue affects: SUSE Rancher wrangler version 0.7.3 and prior versions; wrangler version 0.8.4 and prior versions; wrangler version 1.0.0 and prior versions.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-43756", "id": "GSD-2022-43756", "references": [ "https://www.suse.com/security/cve/CVE-2022-43756.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-43756" ], "details": "A Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027) vulnerability in SUSE Rancher allows remote attackers to cause denial of service by supplying specially crafted git credentials. This issue affects: SUSE Rancher wrangler version 0.7.3 and prior versions; wrangler version 0.8.4 and prior versions; wrangler version 1.0.0 and prior versions.", "id": "GSD-2022-43756", "modified": "2023-12-13T01:19:31.505499Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2023-01-25T00:00:00.000Z", "ID": "CVE-2022-43756", "STATE": "PUBLIC", "TITLE": "Rancher/Wrangler: Denial of service when processing Git credentials" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Rancher", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "wrangler", "version_value": "0.7.3" }, { "version_affected": "\u003c=", "version_name": "wrangler", "version_value": "0.8.4" }, { "version_affected": "\u003c=", "version_name": "wrangler", "version_value": "1.0.0" } ] } } ] }, "vendor_name": "SUSE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027) vulnerability in SUSE Rancher allows remote attackers to cause denial of service by supplying specially crafted git credentials. This issue affects: SUSE Rancher wrangler version 0.7.3 and prior versions; wrangler version 0.8.4 and prior versions; wrangler version 1.0.0 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1205296", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1205296" } ] }, "source": { "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1205296", "defect": [ "1205296" ], "discovery": "INTERNAL" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c=v0.7.3 || \u003e=v0.8.0 \u003c=v0.8.4 || \u003e=v0.8.6 \u003cv0.8.11 || =v1.0.0", "affected_versions": "All versions up to 0.7.3, all versions starting from 0.8.0 up to 0.8.4, all versions starting from 0.8.6 before 0.8.11, version 1.0.0", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2023-01-25", "description": "### Impact\n\nA denial of services (DoS) vulnerability was discovered in Wrangler Git package affecting versions up to and including `v1.0.0`.\n\nSpecially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. \n\n### Workarounds\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.\n\n### Patches\n\nPatched versions include `v1.0.1` and later and the backported tags - `v0.7.4-security1`, `v0.8.5-security1` and `v0.8.11`.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n\n* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) or [Wrangler](https://github.com/rancher/wrangler/issues/new) repository.\n* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).", "fixed_versions": [ "v0.7.4-security1", "v0.8.5-security1", "v0.8.11", "v1.0.1" ], "identifier": "GMS-2023-144", "identifiers": [ "GHSA-8fcj-gf77-47mg", "GMS-2023-144", "CVE-2022-43756" ], "not_impacted": "All versions after 0.7.3 before 0.8.0, all versions after 0.8.4 before 0.8.6, all versions starting from 0.8.11 before 1.0.0, all versions after 1.0.0", "package_slug": "go/github.com/rancher/wrangler", "pubdate": "2023-01-25", "solution": "Upgrade to versions 0.7.4-security1, 0.8.5-security1, 0.8.11, 1.0.1 or above.", "title": "Denial of service (DoS) when processing Git credentials", "urls": [ "https://github.com/rancher/wrangler/security/advisories/GHSA-8fcj-gf77-47mg", "https://github.com/advisories/GHSA-8fcj-gf77-47mg" ], "uuid": "8547bf51-b6d8-4ae4-a956-ff108d7f6e9a", "versions": [ { "commit": { "sha": "b1b1eff795f1507fd20fb73b205d47bc160dc9f2", "tags": [ "v0.8.0" ], "timestamp": "20210412213642" }, "number": "v0.8.0" }, { "commit": { "sha": "8247b506827aba5b9f7494f31d43d5b4aabfe6be", "tags": [ "v0.8.4" ], "timestamp": "20210803150718" }, "number": "v0.8.4" }, { "commit": { "sha": "f30c1f857ac081c561db47969f3236373af2b9f6", "tags": [ "v0.8.6" ], "timestamp": "20210915214804" }, "number": "v0.8.6" }, { "commit": { "sha": "5167c04fcdd50e24d9710813572382eeb3064805", "tags": [ "v1.0.0" ], "timestamp": "20220510190854" }, "number": "v1.0.0" }, { "commit": { "sha": "5a387e13e8d51e3340d9e5012a1951f0cca5fc90", "tags": [ "v0.8.11" ], "timestamp": "20230123114814" }, "number": "v0.8.11" }, { "commit": { "sha": "12397eec50155cb2d24aa70bdf9e90c5f3b9a727", "tags": [ "v0.7.4-security1" ], "timestamp": "20230123114828" }, "number": "v0.7.4-security1" }, { "commit": { "sha": "341018c8fef3e12867c7cb2649bd2cecac75f287", "tags": [ "v1.0.1" ], "timestamp": "20230123114835" }, "number": "v1.0.1" }, { "commit": { "sha": "8649ecc062204f28764fd80157a621cbae89c9cf", "tags": [ "v0.8.5-security1" ], "timestamp": "20230123114839" }, "number": "v0.8.5-security1" } ] } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:wrangler:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:wrangler:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.7.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:wrangler:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.8.5", "versionStartIncluding": "0.8.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@suse.com", "ID": "CVE-2022-43756" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027) vulnerability in SUSE Rancher allows remote attackers to cause denial of service by supplying specially crafted git credentials. This issue affects: SUSE Rancher wrangler version 0.7.3 and prior versions; wrangler version 0.8.4 and prior versions; wrangler version 1.0.0 and prior versions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-74" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1205296", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Mitigation" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1205296" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-15T02:16Z", "publishedDate": "2023-02-07T13:15Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.