Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/dapr/dapr
  4. ›
  5. CVE-2024-35223

CVE-2024-35223: Dapr API Token Exposure

May 22, 2024

A vulnerability has been found in Dapr that causes a leak of the application token of the invoker app to the invoked app when using Dapr as a gRPC proxy for remote service invocation. This issue arises because Dapr sends the app token of the invoker app instead of the app token of the invoked app.

Users who leverage Dapr for gRPC proxy service invocation and are using the app API token feature are encouraged to upgrade Dapr to version 1.13.3.

References

  • github.com/advisories/GHSA-284c-x8m7-9w5h
  • github.com/dapr/dapr
  • github.com/dapr/dapr/commit/e0591e43d0cdfd30a2f2960dce5d9892dc98bc2c
  • github.com/dapr/dapr/releases/tag/v1.13.3
  • github.com/dapr/dapr/security/advisories/GHSA-284c-x8m7-9w5h
  • nvd.nist.gov/vuln/detail/CVE-2024-35223

Code Behaviors & Features

Detect and mitigate CVE-2024-35223 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.13.0 before 1.13.3

Fixed versions

  • 1.13.3

Solution

Upgrade to version 1.13.3 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

go/github.com/dapr/dapr/CVE-2024-35223.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:15 +0000.