CVE-2024-37298

EUVD-2024-2233
gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 50%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
gorillatoolkitschema
𝑥
< 1.4.1
ADP
Debian logo
Debian Releases
Debian Product
Codename
golang-github-gorilla-schema
bookworm
no-dsa
forky
1.4.1-1
fixed
sid
1.4.1-1
fixed
trixie
1.4.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
golang-github-gorilla-schema
focal
dne
jammy
dne
mantic
ignored
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage