ghsa-v9jh-j8px-98vq
Vulnerability from github
Published
2023-10-18 06:30
Modified
2024-09-13 18:36
Severity ?
VLAI Severity ?
Summary
go-ethereum vulnerable to denial of service via crafted GraphQL query
Details
Geth (aka go-ethereum) through 1.13.4, when --http --graphql
is used, allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a crafted GraphQL query.
NOTE: the vendor's position is that the "graphql endpoint [is not] designed to withstand attacks by hostile clients, nor handle huge amounts of clients/traffic.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/ethereum/go-ethereum" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "1.13.4" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-42319" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2023-10-18T18:28:24Z", "nvd_published_at": "2023-10-18T06:15:07Z", "severity": "HIGH" }, "details": "Geth (aka go-ethereum) through 1.13.4, when `--http --graphql` is used, allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a crafted GraphQL query.\n\nNOTE: the vendor\u0027s position is that the \"graphql endpoint [is not] designed to withstand attacks by hostile clients, nor handle huge amounts of clients/traffic.", "id": "GHSA-v9jh-j8px-98vq", "modified": "2024-09-13T18:36:55Z", "published": "2023-10-18T06:30:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42319" }, { "type": "WEB", "url": "https://blog.mevsec.com/posts/geth-dos-with-graphql" }, { "type": "WEB", "url": "https://geth.ethereum.org/docs/fundamentals/security" }, { "type": "PACKAGE", "url": "https://github.com/ethereum/go-ethereum" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "go-ethereum vulnerable to denial of service via crafted GraphQL query" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…