Description
There exists an vulnerability causing an abort() to be called in gRPC. The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.
Remediation
References
https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8
Related Vulnerabilities
CVE-2021-42550 Vulnerability in maven package ch.qos.logback:logback-core
CVE-2013-4271 Vulnerability in maven package org.restlet:org.restlet
CVE-2023-22477 Vulnerability in npm package mercurius
CVE-2020-9482 Vulnerability in maven package org.apache.nifi.registry:nifi-registry-web-api
CVE-2021-33609 Vulnerability in maven package com.vaadin:vaadin-server