CVE-2023-50728 (GCVE-0-2023-50728)
Vulnerability from cvelistv5 – Published: 2023-12-15 21:59 – Updated: 2024-08-02 22:16
VLAI?
Title
Unauthenticated Denial of Service in the octokit/webhooks library
Summary
octokit/webhooks is a GitHub webhook events toolset for Node.js. Starting in 9.26.0 and prior to 9.26.3, 10.9.2, 11.1.2, and 12.0.4, there is a problem caused by an issue with error handling in the @octokit/webhooks library because the error can be undefined in some cases. The resulting request was found to cause an uncaught exception that ends the nodejs process. The bug is fixed in octokit/webhooks.js 9.26.3, 10.9.2, 11.1.2, and 12.0.4, app.js 14.02, octokit.js 3.1.2, and Protobot 12.3.3.
Severity ?
5.4 (Medium)
CWE
- CWE-755 - Improper Handling of Exceptional Conditions
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| octokit | webhooks.js |
Affected:
>= 9.26.0, < 9.26.3
Affected: >= 10.9.0, < 10.9.2 Affected: >= 11.1.0, < 11.1.2 Affected: >= 12.0.0, < 12.0.4 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T22:16:47.284Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv"
},
{
"name": "https://github.com/octokit/app.js/releases/tag/v14.0.2",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/octokit/app.js/releases/tag/v14.0.2"
},
{
"name": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3"
},
{
"name": "https://github.com/probot/probot/releases/tag/v12.3.3",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/probot/probot/releases/tag/v12.3.3"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "webhooks.js",
"vendor": "octokit",
"versions": [
{
"status": "affected",
"version": "\u003e= 9.26.0, \u003c 9.26.3"
},
{
"status": "affected",
"version": "\u003e= 10.9.0, \u003c 10.9.2"
},
{
"status": "affected",
"version": "\u003e= 11.1.0, \u003c 11.1.2"
},
{
"status": "affected",
"version": "\u003e= 12.0.0, \u003c 12.0.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "octokit/webhooks is a GitHub webhook events toolset for Node.js. Starting in 9.26.0 and prior to 9.26.3, 10.9.2, 11.1.2, and 12.0.4, there is a problem caused by an issue with error handling in the @octokit/webhooks library because the error can be undefined in some cases. The resulting request was found to cause an uncaught exception that ends the nodejs process. The bug is fixed in octokit/webhooks.js 9.26.3, 10.9.2, 11.1.2, and 12.0.4, app.js 14.02, octokit.js 3.1.2, and Protobot 12.3.3."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-755",
"description": "CWE-755: Improper Handling of Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-15T21:59:00.312Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv"
},
{
"name": "https://github.com/octokit/app.js/releases/tag/v14.0.2",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/octokit/app.js/releases/tag/v14.0.2"
},
{
"name": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4"
},
{
"name": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3"
},
{
"name": "https://github.com/probot/probot/releases/tag/v12.3.3",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/probot/probot/releases/tag/v12.3.3"
}
],
"source": {
"advisory": "GHSA-pwfr-8pq7-x9qv",
"discovery": "UNKNOWN"
},
"title": "Unauthenticated Denial of Service in the octokit/webhooks library"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-50728",
"datePublished": "2023-12-15T21:59:00.312Z",
"dateReserved": "2023-12-11T17:53:36.032Z",
"dateUpdated": "2024-08-02T22:16:47.284Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…