7.5 HIGH
- CVSS version (CVSS): 3.1
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): Low (L)
- Privileges Required (PR): None (N)
- User Interaction (UI): None (N)
- Scope (S): Unchanged (U)
- Confidentiality (C): None (N)
- Integrity (I): None (N)
- Availability (A): High (H)
- Modified Attack Vector (MAV): Network (N)
- Modified Attack Complexity (MAC): Low (L)
- Modified Privileges Required (MPR): None (N)
- Modified User Interaction (MUI): None (N)
- Modified Confidentiality (MC): None (N)
- Modified Scope (MS): Unchanged (U)
- Modified Integrity (MI): None (N)
- Modified Availability (MA): High (H)
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
Granian: Unauthenticated DoS via WebSocket subprotocol header panic
Granian is a Rust HTTP server for Python applications. From 1.2.0 to 2.7.4, Granian aborts a worker process when an unauthenticated client sends a WebSocket upgrade request whose Sec-WebSocket-Protocol header contains non-ASCII bytes. The crash happens in Granian's WebSocket scope construction path, before the ASGI application is invoked. This vulnerability is fixed in 2.7.4.
References
Affected products
- ==>= 1.2.0, < 2.7.4
Matching in nixpkgs
pkgs.granian
Rust HTTP server for Python ASGI/WSGI/RSGI applications
pkgs.python312Packages.granian
Rust HTTP server for Python ASGI/WSGI/RSGI applications
pkgs.python313Packages.granian
Rust HTTP server for Python ASGI/WSGI/RSGI applications
pkgs.python314Packages.granian
Rust HTTP server for Python ASGI/WSGI/RSGI applications
Package maintainers
-
@lucastso10 Lucas Teixeira Soares <lucastso10@gmail.com>
-
@pbsds Peder Bergebakken Sundt <pbsds@hotmail.com>