// For flags

CVE-2024-35194

Stacklok Minder vulnerable to denial of service from maliciously crafted templates

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Minder is a software supply chain security platform. Prior to version 0.0.50, Minder engine is susceptible to a denial of service from memory exhaustion that can be triggered from maliciously created templates. Minder engine uses templating to generate strings for various use cases such as URLs, messages for pull requests, descriptions for advisories. In some cases can the user control both the template and the params for it, and in a subset of these cases, Minder reads the generated template entirely into memory. When Minders templating meets both of these conditions, an attacker is able to generate large enough templates that Minder will exhaust memory and crash. This vulnerability is fixed in 0.0.50.

Minder es una plataforma de seguridad de la cadena de suministro de software. Antes de la versión 0.0.50, el motor Minder es susceptible a una denegación de servicio por agotamiento de la memoria que puede desencadenarse a partir de plantillas creadas con fines malintencionados. El motor Minder utiliza plantillas para generar cadenas para diversos casos de uso, como URL, mensajes para solicitudes de extracción y descripciones para avisos. En algunos casos, el usuario puede controlar tanto la plantilla como sus parámetros y, en un subconjunto de estos casos, Minder lee la plantilla generada por completo en la memoria. Cuando las plantillas de Minders cumplen ambas condiciones, un atacante puede generar plantillas lo suficientemente grandes como para que Minder agote la memoria y falle. Esta vulnerabilidad se solucionó en 0.0.50.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-05-10 CVE Reserved
  • 2024-05-20 CVE Published
  • 2024-05-21 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Stacklok
Search vendor "Stacklok"
Minder
Search vendor "Stacklok" for product "Minder"
< 0.0.50
Search vendor "Stacklok" for product "Minder" and version " < 0.0.50"
en
Affected