CVE-2024-37298Allocation of Resources Without Limits or Throttling in Schema

Severity
7.5HIGHNVD
EPSS
0.3%
top 49.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 1
Latest updateJul 9

Description

gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages15 packages

CVEListV5gorilla/schema< 1.4.1
debiandebian/golang-github-gorilla-schema< golang-github-gorilla-schema 1.4.1-1 (forky)

🔴Vulnerability Details

4
OSV
Potential memory exhaustion attack due to sparse slice deserialization in github.com/gorilla/schema2024-07-02
GHSA
Potential memory exhaustion attack due to sparse slice deserialization2024-07-01
OSV
Potential memory exhaustion attack due to sparse slice deserialization2024-07-01
OSV
CVE-2024-37298: gorilla/schema converts structs to and from form values2024-07-01

📋Vendor Advisories

3
Microsoft
Potential memory exhaustion attack due to sparse slice deserialization2024-07-09
Red Hat
gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization2024-06-30
Debian
CVE-2024-37298: golang-github-gorilla-schema - gorilla/schema converts structs to and from form values. Prior to version 1.4.1 ...2024