The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Improper Control of Dynamically-Managed Code Resources vulnerabilities in an interactive lesson.
Start learningUpgrade apollo-router
to version 1.45.1 or higher.
apollo-router is a configurable, high-performance routing runtime for Apollo Federation.
Affected versions of this package are vulnerable to Improper Control of Dynamically-Managed Code Resources due to a bug in the cache retrieval logic. This bug, when distributed query planning caching is enabled, may lead to the execution of an unexpected variation of a previously executed operation or the generation of unexpected errors. Specifically, this could result in fetching incorrect data or executing incorrect mutations on underlying subgraph servers.
Note
This is only exploitable if the Router instances are configured to use distributed query plan caching.
If you are using the affected versions, you can check your router’s configuration YAML to verify if you are impacted:
supergraph:
query_planning:
cache:
# Look for this config below
redis:
urls: ["redis://..."]
This vulnerability can be mitigated by disabling distributed query plan caching by removing the supergraph.query_planning.cache.redis.urls
configuration. Note that disabling distributed query plan caching will result in each Router instance maintaining its own in-memory query plan cache, potentially increasing resource utilization and cold-start times.