Description
Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param `days`. The vulnerability is related to how the backend reads the `days` URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue.
Published: 2023-09-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-2611 Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param `days`. The vulnerability is related to how the backend reads the `days` URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue.
Github GHSA Github GHSA GHSA-x4hh-vjm7-g2jv Faktory Web Dashboard can lead to denial of service(DOS) via malicious user input
History

Tue, 24 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:contribsys:faktory:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Contribsys Faktory
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-24T18:55:05.037Z

Reserved: 2023-06-29T19:35:26.441Z

Link: CVE-2023-37279

cve-icon Vulnrichment

Updated: 2024-08-02T17:09:33.935Z

cve-icon NVD

Status : Modified

Published: 2023-09-20T22:15:13.093

Modified: 2024-11-21T08:11:23.010

Link: CVE-2023-37279

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses