Allocation of Resources Without Limits or Throttling Affecting apollo-router package, versions >=1.7.0 <1.52.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUST-APOLLOROUTER-7840534
- published 28 Aug 2024
- disclosed 27 Aug 2024
- credit Unknown
Introduced: 27 Aug 2024
CVE-2024-43783 Open this link in a new tabHow to fix?
Upgrade apollo-router
to version 1.52.1 or higher.
Overview
apollo-router is a configurable, high-performance routing runtime for Apollo Federation.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the handling of request bodies in the RouterService
layer.
Note: Users are vulnerable only if they use External Coprocessing with specific configurations or Native Rust Plugins accessing the Router request body in the RouterService layer. Router customizations using Rhai scripts are not impacted.
Workaround
Users that are not able to upgrade to the fixed version can set the coprocessor.router.request.body
configuration option to false
.
Note: Changing this configuration option will change the information sent to any coprocessors the user has configured and may impact functionality implemented by those coprocessors.
For users using the Native Rust Plugin, update the plugin to either not accumulate the request body or enforce a maximum body size limit.