2024-12-08 03:06:42 +00:00

72 lines
3.4 KiB
JSON

{
"id": "CVE-2024-35194",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-20T21:15:09.773",
"lastModified": "2024-11-21T09:19:54.380",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50."
},
{
"lang": "es",
"value": "Minder es una plataforma de seguridad de la cadena de suministro de software. Antes de la versi\u00f3n 0.0.50, el motor Minder es susceptible a una denegaci\u00f3n de servicio por agotamiento de la memoria que puede desencadenarse a partir de plantillas creadas con fines malintencionados. El motor Minder utiliza plantillas para generar cadenas para diversos casos de uso, como URL, mensajes para solicitudes de extracci\u00f3n y descripciones para avisos. En algunos casos, el usuario puede controlar tanto la plantilla como sus par\u00e1metros y, en un subconjunto de estos casos, Minder lee la plantilla generada por completo en la memoria. Cuando las plantillas de Minders cumplen ambas condiciones, un atacante puede generar plantillas lo suficientemente grandes como para que Minder agote la memoria y falle. Esta vulnerabilidad se solucion\u00f3 en 0.0.50."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}