GHSA-r5fr-9gmv-jggh: scim_proton and kanidm_proto have an authenticated process abort via SCIM filter stack exhaustion
A single unauthenticated GET to any /scim/v1/... endpoint with a ?filter= query string of a few thousand nested parentheses (≈ 4–12 KB) drives the recursive-descent PEG parser past the worker thread’s stack guard page. Rust responds to stack overflow with std::process::abort() — the entire kanidmd process exits. The parse runs inside axum’s Query<ScimEntryGetQuery> extractor, before any handler body and therefore before any ACL check.
References
Code Behaviors & Features
Detect and mitigate GHSA-r5fr-9gmv-jggh with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →