Reachable Assertion Affecting wavefront-proxy package, versions <13.4-r1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.13% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-WAVEFRONTPROXY-6070632
  • published21 Nov 2023
  • disclosed9 Jun 2023

Introduced: 9 Jun 2023

CVE-2023-1428  (opens in a new tab)
CWE-617  (opens in a new tab)

How to fix?

Upgrade Wolfi wavefront-proxy to version 13.4-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream wavefront-proxy package and not the wavefront-proxy package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2:

te: x (x != trailers)

:scheme: x (x != http, https)

grpclb_client_stats: x (x == anything)

On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.

CVSS Scores

version 3.1