7.5
CVSSv3

CVE-2023-32731

Published: 09/06/2023 Updated: 15/06/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  github.com/grpc/grpc/pull/33005 github.com/grpc/grpc/pull/33005

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

grpc grpc

Vendor Advisories

DescriptionThe MITRE CVE dictionary describes this issue as: When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver If leveraged, say, between a proxy and a backe ...