Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/contribsys/faktory
  4. ›
  5. CVE-2023-37279

CVE-2023-37279: Memory Allocation with Excessive Size Value

September 20, 2023 (updated September 25, 2023)

Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param days. The vulnerability is related to how the backend reads the days URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue.

References

  • github.com/advisories/GHSA-x4hh-vjm7-g2jv
  • github.com/contribsys/faktory/security/advisories/GHSA-x4hh-vjm7-g2jv
  • nvd.nist.gov/vuln/detail/CVE-2023-37279

Code Behaviors & Features

Detect and mitigate CVE-2023-37279 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.8.0

Fixed versions

  • v1.8.0

Solution

Upgrade to version 1.8.0 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

go/github.com/contribsys/faktory/CVE-2023-37279.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:39 +0000.