CVE-2024-37298 – Potential memory exhaustion attack due to sparse slice deserialization
https://notcve.org/view.php?id=CVE-2024-37298
gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue. gorilla/schema convierte estructuras hacia y desde valores de formulario. Antes de la versión 1.4.1 La ejecución de `schema.Decoder.Decode()` en una estructura que tiene un campo de tipo `[]struct{...}` la abre a ataques maliciosos relacionados con las asignaciones de memoria, aprovechando la escasez de memoria. funcionalidad de corte. • https://github.com/gorilla/schema/blob/main/decoder.go#L223 https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 https://access.redhat.com/security/cve/CVE-2024-37298 https://bugzilla.redhat.com/show_bug.cgi?id=2295010 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2014-5200 – FBGorilla (All Versions) - SQL Injection
https://notcve.org/view.php?id=CVE-2014-5200
SQL injection vulnerability in game_play.php in the FB Gorilla plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter. Vulnerabilidad de inyección SQL en game_play.php en el plugin FB Gorilla para WordPress permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro id. • https://www.exploit-db.com/exploits/39283 http://packetstormsecurity.com/files/127639 https://exchange.xforce.ibmcloud.com/vulnerabilities/94916 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •