Skip to content

Stud42 vulnerable to denial of service

High severity GitHub Reviewed Published Mar 28, 2023 in 42atomys/stud42 • Updated Apr 25, 2023

Package

gomod atomys.codes/stud42 (Go)

Affected versions

< 0.23.0

Patched versions

0.23.0

Description

A security vulnerability has been identified in the GraphQL parser used by the API of s42.app. An attacker can overload the parser and cause the API pod to crash. With a bit of threading, the attacker can bring down the entire API, resulting in an unhealthy stream. This vulnerability can be exploited by sending a specially crafted request to the API with a large payload.

An attacker can exploit this vulnerability to cause a denial of service (DoS) attack on the s42.app API, resulting in unavailability of the API for legitimate users.

References

@42atomys 42atomys published to 42atomys/stud42 Mar 28, 2023
Published to the GitHub Advisory Database Mar 31, 2023
Reviewed Mar 31, 2023
Last updated Apr 25, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-3hwm-922r-47hw

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.