Allocation of Resources Without Limits or Throttling Affecting com.epam.reportportal:service-api package, versions [,5.11.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.15% (53rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMEPAMREPORTPORTAL-5961563
  • published12 Oct 2023
  • disclosed10 Oct 2023
  • creditUnknown

Introduced: 10 Oct 2023

CVE-2023-25822  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade com.epam.reportportal:service-api to version 5.11.0 or higher.

Overview

com.epam.reportportal:service-api is a Report portal. Main API Service

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling when the test_item.path field is exceeded the allowable ltree field type indexing limit. An attacker can cause the ReportPortal database to become unstable and reporting almost fully stops except for small launches with approximately 1 test inside by creating a Launch with too many recursively nested elements.

Note: This is only exploitable if the test_item.path field is exceeded the allowable ltree field type indexing limit.

Workaround

This vulnerability can be mitigated by deleting the data with long paths, and reindexing both indexes path_gist_idx and path_idx.

CVSS Scores

version 3.1