Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2023-50730
December 22, 2023
Grackle is a GraphQL server written in functional Scala, built on the Typelevel stack. The GraphQL specification requires that GraphQL fragments must not form cycles, either directly or indirectly. Prior to Grackle version 0.18.0, that requirement wasn't checked, and queries with cyclic fragments would have been accepted for type checking and compilation. The attempted compilation of such fragments would result in a JVM "StackOverflowError" being thrown. Some knowledge of an applications GraphQL schema would be required to construct such a query, however no knowledge of any application-specific performance or other behavioural characteristics would be needed. Grackle uses the cats-parse library for parsing GraphQL queries. Prior to version 0.18.0, Grackle made use of the cats-parse "recursive" operator. However, "recursive" is not currently stack safe. "recursive" was used in three places in the parser: nested selection sets, nested input values (lists and objects), and nested list type declarations. Consequently, queries with deeply nested selection sets, input values or list types could be constructed which exploited this, causing a JVM "StackOverflowException" to be thrown during parsing. Because this happens very early in query processing, no specific knowledge of an applications GraphQL schema would be required to construct such a query. The possibility of small queries resulting in stack overflow is a potential denial of service vulnerability. This potentially affects all applications using Grackle which have untrusted users. Both stack overflow issues have been resolved in the v0.18.0 release of Grackle. As a workaround, users could interpose a sanitizing layer in between untrusted input and Grackle query processing.
Affected Packages
org.typelevel:grackle-core_sjs1_2.13 (JAVA):
Affected version(s) >=0.15.0 <0.18.0
Fix Suggestion:
Update to version 0.18.0
org.typelevel:grackle-core_native0.4_2.13 (JAVA):
Affected version(s) >=0.15.0 <0.18.0
Fix Suggestion:
Update to version 0.18.0
org.typelevel:grackle-core_native0.4_3 (JAVA):
Affected version(s) >=0.15.0 <0.18.0
Fix Suggestion:
Update to version 0.18.0
org.typelevel:grackle-core_3 (JAVA):
Affected version(s) >=0.15.0 <0.18.0
Fix Suggestion:
Update to version 0.18.0
org.typelevel:grackle-core_2.13 (JAVA):
Affected version(s) >=0.15.0 <0.18.0
Fix Suggestion:
Update to version 0.18.0
org.typelevel:grackle-core_sjs1_3 (JAVA):
Affected version(s) >=0.15.0 <0.18.0
Fix Suggestion:
Update to version 0.18.0
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Allocation of Resources Without Limits or Throttling
Uncontrolled Resource Consumption
EPSS
Base Score:
0.52