Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param `days`. The vulnerability is related to how the backend reads the `days` URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:contribsys:faktory:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-09-24T18:55:05.037Z

Reserved: 2023-06-29T19:35:26.441Z

Link: CVE-2023-37279

cve-icon Vulnrichment

Updated: 2024-08-02T17:09:33.935Z

cve-icon NVD

Status : Modified

Published: 2023-09-20T22:15:13.093

Modified: 2024-11-21T08:11:23.010

Link: CVE-2023-37279

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.