CVE-2023-2253Undefined Behavior for Input to API in Distribution Distribution

Severity
6.5MEDIUMNVD
OSV7.5
EPSS
0.1%
top 64.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 6
Latest updateSep 5

Description

A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

Gogithub.com/distribution_distribution< 2.8.2-beta.1+incompatible

Also affects: Openshift Container Platform 4.0

🔴Vulnerability Details

6
OSV
docker-registry vulnerabilities2023-09-05
CVEList
CVE-2023-2253: A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records retur2023-06-06
OSV
CVE-2023-2253: A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records retur2023-06-06
OSV
Memory exhaustion in github.com/distribution/distribution2023-05-24
OSV
distribution catalog API endpoint can lead to OOM via malicious user input2023-05-11

📋Vendor Advisories

4
Ubuntu
Docker Registry vulnerabilities2023-09-04
Microsoft
A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows 2023-06-13
Red Hat
distribution/distribution: DoS from malicious API request2023-05-09
Debian
CVE-2023-2253: docker-registry - A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, wh...2023
CVE-2023-2253 — Undefined Behavior for Input to API | cvebase