Improper Input Validation (CWE-20)
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can be corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
This vulnerability can lead to stack overflow attacks, potentially causing application crashes or allowing arbitrary code execution. It affects projects using Google's Protocol Buffers (protobuf) library for parsing untrusted data. The impact could be severe, as it may allow attackers to crash applications or potentially execute malicious code, compromising the integrity and availability of affected systems.
One proof-of-concept exploit is available on github.com. There is no evidence of proof of exploitation at the moment.
A patch is available. The vulnerability was addressed in a GitHub advisory (GHSA-735f-pc8j-v9w8) on September 18, 2024. Additionally, Oracle released a patch as part of their Critical Patch Update on October 15, 2024.
1. Update to the latest version of the protobuf library as soon as possible. 2. Implement input validation to limit the depth of nested groups in Protocol Buffers data. 3. Use a parser that enforces limits on recursion depth when processing Protocol Buffers. 4. Consider using the DiscardUnknownFieldsParser or Java Protobuf Lite parser only with trusted input. 5. Monitor and log any attempts to exploit this vulnerability. 6. Implement proper error handling to gracefully manage potential stack overflow situations.
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
NVD published the first details for CVE-2024-7254
Feedly found the first article mentioning CVE-2024-7254. See article
Feedly estimated the CVSS score as HIGH
Detection for the vulnerability has been added to Qualys (5001055)
Detection for the vulnerability has been added to Qualys (5001047)
EPSS Score was set to: 0.04% (Percentile: 9.6%)
CVE-2024-7254 is a critical vulnerability with a CVSS score of 9.8, indicating a high risk of exploitation. Currently, there are reports of active exploitation in the wild, particularly by sophisticated threat actors, and proof-of-concept exploits have been made available. Mitigations and patches are being developed, but organizations should remain vigilant as this vulnerability may have downstream impacts on third-party vendors and related technologies. See article
A CVSS base score of 8.7 has been assigned.