### [CVE-2024-37298](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37298) ![](https://img.shields.io/static/v1?label=Product&message=schema&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.4.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen) ### Description gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue. ### POC #### Reference - https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 #### Github No PoCs found on GitHub currently.