GHSA-3hwm-922r-47hw

Suggest an improvement
Source
https://github.com/advisories/GHSA-3hwm-922r-47hw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/03/GHSA-3hwm-922r-47hw/GHSA-3hwm-922r-47hw.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-3hwm-922r-47hw
Published
2023-03-31T19:33:44Z
Modified
2023-04-25T23:06:52Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Stud42 vulnerable to denial of service
Details

A security vulnerability has been identified in the GraphQL parser used by the API of s42.app. An attacker can overload the parser and cause the API pod to crash. With a bit of threading, the attacker can bring down the entire API, resulting in an unhealthy stream. This vulnerability can be exploited by sending a specially crafted request to the API with a large payload.

An attacker can exploit this vulnerability to cause a denial of service (DoS) attack on the s42.app API, resulting in unavailability of the API for legitimate users.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-03-31T19:33:44Z"
}
References

Affected packages

Go / atomys.codes/stud42

Package

Name
atomys.codes/stud42
View open source insights on deps.dev
Purl
pkg:golang/atomys.codes/stud42

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.23.0