CVE-2023-48713:
Knative Serving vulnerable to attacker-controlled pod causing denial of service of autoscaler
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22897%
CWE
Published
11/27/2023
Updated
12/4/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
knative.dev/serving | go | < 0.39.0 | 0.39.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from uncontrolled resource consumption during metrics response processing. The commit diff shows the patched version introduced an io.LimitedReader to restrict response size (N: 6*10 + 256 + 20), replacing the vulnerable b.ReadFrom(body) call. The test case added in http_scrape_client_test.go specifically validates protection against long PodName values that would previously trigger memory exhaustion. This directly maps to CWE-400 (Uncontrolled Resource Consumption) described in the advisory.