CVE-2023-45812: Apollo Router vulnerable to Improper Check or Handling of Exceptional Conditions
The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when a multi-part response is sent. When users send queries to the router that uses the @defer
or Subscriptions, the Router will panic.
To be vulnerable, users of Router must have a coprocessor with coprocessor.supergraph.response
configured in their router.yaml
and also to support either @defer
or Subscriptions.
References
- github.com/advisories/GHSA-r344-xw3p-2frj
- github.com/apollographql/router
- github.com/apollographql/router/commit/b917b8c117b46a2d508428c0856f4927dfcfc341
- github.com/apollographql/router/issues/4013
- github.com/apollographql/router/pull/4014
- github.com/apollographql/router/security/advisories/GHSA-r344-xw3p-2frj
- nvd.nist.gov/vuln/detail/CVE-2023-45812
Detect and mitigate CVE-2023-45812 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →