Safety vulnerability ID: 59869
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Grpcio 1.53.0 includes a fix for a Connection Confusion vulnerability. When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration.
https://github.com/advisories/GHSA-cfgp-2977-2fmm
Latest version: 1.68.1
HTTP/2-based RPC framework
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application