Exploit maturity not defined.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Information Exposure vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/authzed/spicedb/pkg/cmd/server
to version 1.19.1 or higher.
github.com/authzed/spicedb/pkg/cmd/server is a Google Zanzibar-inspired fine-grained permissions database
Affected versions of this package are vulnerable to Information Exposure via the metrics service /debug/pprof/cmdline
endpoint, if sensitive values - including passwords - are passed in via the --grpc-preshared-key
flag.
NOTE: These deployments are not affected:
Authzed's SpiceDB Serverless
Authzed's SpiceDB Dedicated
SpiceDB Operator
SpiceDB configured via environment variables
This vulnerability can be avoided by
Configuring the preshared key via an environment variable (e.g. SPICEDB_GRPC_PRESHARED_KEY=yoursecret spicedb serve
)
Reconfiguring the --metrics-addr
flag to bind to a trusted network (e.g. --metrics-addr=localhost:9090
)
Disabling the metrics service via the flag (e.g. --metrics-enabled=false
)
Adopting one of the recommended deployment models: Authzed's managed services or the SpiceDB Operator