Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hqxw-f8mx-cpmw

Опубликовано: 11 мая 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

distribution catalog API endpoint can lead to OOM via malicious user input

Impact

Systems that run distribution built after a specific commit running on memory-restricted environments can suffer from denial of service by a crafted malicious /v2/_catalog API endpoint request.

Patches

Upgrade to at least 2.8.2-beta.1 if you are running v2.8.x release. If you use the code from the main branch, update at least to the commit after f55a6552b006a381d9167e328808565dd2bf77dc.

Workarounds

There is no way to work around this issue without patching. Restrict access to the affected API endpoint: see the recommendations section.

References

/v2/_catalog endpoint accepts a parameter to control the maximum amount of records returned (query string: n).

When not given the default n=100 is used. The server trusts that n has an acceptable value, however when using a maliciously large value, it allocates an array/slice of n of strings before filling the slice with data.

This behaviour was introduced ~7yrs ago [1].

Recommendation

The /v2/_catalog endpoint was designed specifically to do registry syncs with search or other API systems. Such an endpoint would create a lot of load on the backend system, due to overfetch required to serve a request in certain implementations.

Because of this, we strongly recommend keeping this API endpoint behind heightened privilege and avoiding leaving it exposed to the internet.

For more information

If you have any questions or comments about this advisory:

[1] faulty commit

Пакеты

Наименование

github.com/docker/distribution

go
Затронутые версииВерсия исправления

< 2.8.2-beta.1

2.8.2-beta.1

EPSS

Процентиль: 26%
0.00093
Низкий

7.5 High

CVSS3

Дефекты

CWE-475
CWE-770

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.

CVSS3: 6.5
redhat
больше 2 лет назад

A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.

CVSS3: 6.5
nvd
больше 2 лет назад

A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.

CVSS3: 6.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 6.5
debian
больше 2 лет назад

A flaw was found in the `/v2/_catalog` endpoint in distribution/distri ...

EPSS

Процентиль: 26%
0.00093
Низкий

7.5 High

CVSS3

Дефекты

CWE-475
CWE-770