Safety vulnerability ID: 71993
The information on this page was manually curated by our Cybersecurity Intelligence Team.
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration.
Latest version: 1.68.1
HTTP/2-based RPC framework
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application