CVE-2024-2689 – github.com/temporalio/temporal
Package
Manager: go
Name: github.com/temporalio/temporal
Vulnerable Version: >=1.22.0-rc1 <1.22.7 || >=1.21.0 <1.21.6 || >=0 <1.20.5
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00067 pctl0.21066
Details
Temporal Server Denial of Service Denial of Service in Temporal Server prior to version 1.20.5, 1.21.6, and 1.22.7 allows an authenticated user who has permissions to interact with workflows and has crafted an invalid UTF-8 string for submission to potentially cause a crashloop. If left unchecked, the task containing the invalid UTF-8 will become stuck in the queue, causing an increase in queue lag. Eventually, all processes handling these queues will become stuck and the system will run out of resources. The workflow ID of the failing task will be visible in the logs, and can be used to remove that workflow as a mitigation. Version 1.23 is not impacted. In this context, a user is an operator of Temporal Server.
Metadata
Created: 2024-04-04T00:33:11Z
Modified: 2025-02-28T17:42:50Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-wmxc-v39r-p9wf/GHSA-wmxc-v39r-p9wf.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-wmxc-v39r-p9wf
Finding: F184
Auto approve: 1