Allocation of Resources Without Limits or Throttling Affecting apollo-router package, versions >=1.7.0 <1.52.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-APOLLOROUTER-7840534
  • published28 Aug 2024
  • disclosed27 Aug 2024
  • creditUnknown

Introduced: 27 Aug 2024

CVE-2024-43783  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade apollo-router to version 1.52.1 or higher.

Overview

apollo-router is a configurable, high-performance routing runtime for Apollo Federation.

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the handling of request bodies in the RouterService layer. Note: Users are vulnerable only if they use External Coprocessing with specific configurations or Native Rust Plugins accessing the Router request body in the RouterService layer. Router customizations using Rhai scripts are not impacted.

Workaround

Users that are not able to upgrade to the fixed version can set the coprocessor.router.request.body configuration option to false. Note: Changing this configuration option will change the information sent to any coprocessors the user has configured and may impact functionality implemented by those coprocessors. For users using the Native Rust Plugin, update the plugin to either not accumulate the request body or enforce a maximum body size limit.

CVSS Scores

version 4.0
version 3.1