THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-37298

Potential memory exhaustion attack due to sparse slice deserialization

AssignerGitHub_M
Reserved2024-06-05
Published2024-07-01
Updated2024-07-03

Description

gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 1.4.1
affected

References

https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3

https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff

https://github.com/gorilla/schema/blob/main/decoder.go#L223

cve.org CVE-2024-37298

nvd.nist.gov CVE-2024-37298

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-37298