Miggo Logo

CVE-2024-35194: Stacklok Minder vulnerable to denial of service from maliciously crafted templates

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.49866%
Published
5/20/2024
Updated
5/20/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/stacklok/mindergo< 0.0.500.0.50

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from template execution paths where: 1) Both template content and parameters are user-controllable 2) The executed template output is read fully into memory without size limits. The REST ingester's newRequest (via endpoint.String()) and pull request remediation handlers directly process untrusted templates through text/template execution. These functions lack the memory safeguards shown in the patch (io.LimitReader) applied to other similar components, making them susceptible to DoS via memory exhaustion.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Min**r *n*in* is sus**pti*l* to * **ni*l o* s*rvi** *rom m*mory *x**ustion t**t **n ** tri***r** *rom m*li*iously *r**t** t*mpl*t*s. Min**r *n*in* us*s t*mpl*tin* to **n*r*t* strin*s *or v*rious us* **s*s su** *s URLs, m*ss***s *or pull r*qu*sts, **

Reasoning

T** vuln*r**ility st*ms *rom t*mpl*t* *x**ution p*t*s w**r*: *) *ot* t*mpl*t* *ont*nt *n* p*r*m*t*rs *r* us*r-*ontroll**l* *) T** *x**ut** t*mpl*t* output is r*** *ully into m*mory wit*out siz* limits. T** R*ST in**st*r's `n*wR*qu*st` (vi* `*n*point.