Miggo Logo

CVE-2023-48713:
Knative Serving vulnerable to attacker-controlled pod causing denial of service of autoscaler

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.22897%
Published
11/27/2023
Updated
12/4/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
knative.dev/servinggo< 0.39.00.39.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from uncontrolled resource consumption during metrics response processing. The commit diff shows the patched version introduced an io.LimitedReader to restrict response size (N: 6*10 + 256 + 20), replacing the vulnerable b.ReadFrom(body) call. The test case added in http_scrape_client_test.go specifically validates protection against long PodName values that would previously trigger memory exhaustion. This directly maps to CWE-400 (Uncontrolled Resource Consumption) described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * vuln*r**ility w*s *on* in Kn*tiv* S*rvin* t**t *oul* *llow *n *tt**k*r to *r*s* t** Kn*tiv* S*rvin* *utos**l*r r*sultin* in * **ni*l o* s*rvi**. T** *tt**k*r woul* n*** to **v* *ompromis** on* po* in t** Kn*tiv* S*rvin* **ploym*nt, *n*

Reasoning

T** vuln*r**ility st*ms *rom un*ontroll** r*sour** *onsumption *urin* m*tri*s r*spons* pro**ssin*. T** *ommit *i** s*ows t** p*t**** v*rsion intro*u*** *n io.Limit**R****r to r*stri*t r*spons* siz* (N: **** + *** + **), r*pl**in* t** vuln*r**l* *.R**