Uncontrolled Recursion Affecting golang-github-graph-gophers-graphql-go package, versions <1.3.0-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-GOLANGGITHUBGRAPHGOPHERSGRAPHQLGO-2393708
  • published4 Feb 2022
  • disclosed21 Jan 2022

Introduced: 21 Jan 2022

CVE-2022-21708  (opens in a new tab)
CWE-674  (opens in a new tab)

How to fix?

Upgrade Debian:unstable golang-github-graph-gophers-graphql-go to version 1.3.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-github-graph-gophers-graphql-go package and not the golang-github-graph-gophers-graphql-go package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. The issue has been patched in version v1.3.0. The only known workaround for this issue is to disable the graphql.MaxDepth option from your schema which is not recommended.

CVSS Base Scores

version 3.1