Skip to content

Commit 115b75e

Browse files
authored
vulns: add HTTP/2 vulns (#1281)
1 parent 9759f12 commit 115b75e

File tree

1 file changed

+162
-0
lines changed

1 file changed

+162
-0
lines changed

pkg/vulnloader/nvdloader/manual.go

Lines changed: 162 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1104,4 +1104,166 @@ Subsequent use of the cloned handle that does not explicitly set a source to loa
11041104
//////////////////////////////////////////
11051105
// End cURL and libcurl vulnerabilities //
11061106
//////////////////////////////////////////
1107+
////////////////////////////////////
1108+
// Start HTTP/2 Rapid Reset vulns //
1109+
////////////////////////////////////
1110+
"CVE-2023-39325": {
1111+
CVE: &schema.CVEJSON40{
1112+
CVEDataMeta: &schema.CVEJSON40CVEDataMeta{
1113+
ASSIGNER: "cve@mitre.org",
1114+
ID: "CVE-2023-39325",
1115+
},
1116+
DataFormat: "MITRE",
1117+
DataType: "CVE",
1118+
DataVersion: "4.0",
1119+
Description: &schema.CVEJSON40Description{
1120+
DescriptionData: []*schema.CVEJSON40LangString{
1121+
{
1122+
Lang: "en",
1123+
Value: "A flaw was found in the handling of multiplexed streams in the http/2 protocol. A client can repeatedly make requests for a new multiplex streams and immediately send a RST_STREAM frame to cancel them. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for maximum number of active streams per connection, resulting in a denial of service due to server resource consumption.",
1124+
},
1125+
},
1126+
},
1127+
Problemtype: &schema.CVEJSON40Problemtype{
1128+
ProblemtypeData: []*schema.CVEJSON40ProblemtypeProblemtypeData{
1129+
{
1130+
Description: []*schema.CVEJSON40LangString{
1131+
{
1132+
Lang: "en",
1133+
Value: "CWE-611",
1134+
},
1135+
},
1136+
},
1137+
},
1138+
},
1139+
References: &schema.CVEJSON40References{
1140+
ReferenceData: []*schema.CVEJSON40Reference{
1141+
{
1142+
Name: "https://github.com/golang/go/issues/63417",
1143+
Refsource: "MISC",
1144+
Tags: []string{"Patch", "Third Party Advisory"},
1145+
URL: "https://github.com/golang/go/issues/63417",
1146+
},
1147+
},
1148+
},
1149+
},
1150+
Configurations: &schema.NVDCVEFeedJSON10DefConfigurations{
1151+
CVEDataVersion: "4.0",
1152+
Nodes: []*schema.NVDCVEFeedJSON10DefNode{
1153+
{
1154+
CPEMatch: []*schema.NVDCVEFeedJSON10DefCPEMatch{
1155+
{
1156+
Cpe23Uri: `cpe:2.3:a:go:http2:*:*:*:*:*:*:*:*`,
1157+
VersionEndExcluding: "0.17.0",
1158+
Vulnerable: true,
1159+
},
1160+
},
1161+
Operator: "OR",
1162+
},
1163+
},
1164+
},
1165+
Impact: &schema.NVDCVEFeedJSON10DefImpact{
1166+
BaseMetricV3: &schema.NVDCVEFeedJSON10DefImpactBaseMetricV3{
1167+
CVSSV3: &schema.CVSSV30{
1168+
AttackComplexity: "LOW",
1169+
AttackVector: "NETWORK",
1170+
AvailabilityImpact: "HIGH",
1171+
BaseScore: 7.5,
1172+
BaseSeverity: "HIGH",
1173+
ConfidentialityImpact: "NONE",
1174+
IntegrityImpact: "NONE",
1175+
PrivilegesRequired: "NONE",
1176+
Scope: "UNCHANGED",
1177+
UserInteraction: "NONE",
1178+
VectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
1179+
Version: "3.1",
1180+
},
1181+
ExploitabilityScore: 3.9,
1182+
ImpactScore: 3.6,
1183+
},
1184+
},
1185+
LastModifiedDate: "2023-10-11T00:00Z",
1186+
PublishedDate: "2023-10-11T00:00Z",
1187+
},
1188+
"CVE-2023-44487": {
1189+
CVE: &schema.CVEJSON40{
1190+
CVEDataMeta: &schema.CVEJSON40CVEDataMeta{
1191+
ASSIGNER: "cve@mitre.org",
1192+
ID: "CVE-2023-44487",
1193+
},
1194+
DataFormat: "MITRE",
1195+
DataType: "CVE",
1196+
DataVersion: "4.0",
1197+
Description: &schema.CVEJSON40Description{
1198+
DescriptionData: []*schema.CVEJSON40LangString{
1199+
{
1200+
Lang: "en",
1201+
Value: "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
1202+
},
1203+
},
1204+
},
1205+
Problemtype: &schema.CVEJSON40Problemtype{
1206+
ProblemtypeData: []*schema.CVEJSON40ProblemtypeProblemtypeData{
1207+
{
1208+
Description: []*schema.CVEJSON40LangString{
1209+
{
1210+
Lang: "en",
1211+
Value: "CWE-611",
1212+
},
1213+
},
1214+
},
1215+
},
1216+
},
1217+
References: &schema.CVEJSON40References{
1218+
ReferenceData: []*schema.CVEJSON40Reference{
1219+
{
1220+
Name: "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
1221+
Refsource: "MISC",
1222+
Tags: []string{"Patch", "Third Party Advisory"},
1223+
URL: "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
1224+
},
1225+
},
1226+
},
1227+
},
1228+
Configurations: &schema.NVDCVEFeedJSON10DefConfigurations{
1229+
CVEDataVersion: "4.0",
1230+
Nodes: []*schema.NVDCVEFeedJSON10DefNode{
1231+
{
1232+
CPEMatch: []*schema.NVDCVEFeedJSON10DefCPEMatch{
1233+
{
1234+
Cpe23Uri: `cpe:2.3:a:go:http2:*:*:*:*:*:*:*:*`,
1235+
VersionEndExcluding: "0.17.0",
1236+
Vulnerable: true,
1237+
},
1238+
},
1239+
Operator: "OR",
1240+
},
1241+
},
1242+
},
1243+
Impact: &schema.NVDCVEFeedJSON10DefImpact{
1244+
BaseMetricV3: &schema.NVDCVEFeedJSON10DefImpactBaseMetricV3{
1245+
CVSSV3: &schema.CVSSV30{
1246+
AttackComplexity: "LOW",
1247+
AttackVector: "NETWORK",
1248+
AvailabilityImpact: "HIGH",
1249+
BaseScore: 7.5,
1250+
BaseSeverity: "HIGH",
1251+
ConfidentialityImpact: "NONE",
1252+
IntegrityImpact: "NONE",
1253+
PrivilegesRequired: "NONE",
1254+
Scope: "UNCHANGED",
1255+
UserInteraction: "NONE",
1256+
VectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
1257+
Version: "3.1",
1258+
},
1259+
ExploitabilityScore: 3.9,
1260+
ImpactScore: 3.6,
1261+
},
1262+
},
1263+
LastModifiedDate: "2023-10-11T00:00Z",
1264+
PublishedDate: "2023-10-11T00:00Z",
1265+
},
1266+
//////////////////////////////////
1267+
// End HTTP/2 Rapid Reset vulns //
1268+
//////////////////////////////////
11071269
}

0 commit comments

Comments
 (0)