CVE-2024-37298 — Allocation of Resources Without Limits or Throttling in Schema
Severity
7.5HIGHNVD
EPSS
0.3%
top 49.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 1
Latest updateJul 9
Description
gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages15 packages
🔴Vulnerability Details
4OSV▶
Potential memory exhaustion attack due to sparse slice deserialization in github.com/gorilla/schema↗2024-07-02
📋Vendor Advisories
3Red Hat
▶
Debian▶
CVE-2024-37298: golang-github-gorilla-schema - gorilla/schema converts structs to and from form values. Prior to version 1.4.1 ...↗2024