CVE-2024-2689: Temporal Server Denial of Service
Denial of Service in Temporal Server prior to version 1.20.5, 1.21.6, and 1.22.7 allows an authenticated user who has permissions to interact with workflows and has crafted an invalid UTF-8 string for submission to potentially cause a crashloop. If left unchecked, the task containing the invalid UTF-8 will become stuck in the queue, causing an increase in queue lag. Eventually, all processes handling these queues will become stuck and the system will run out of resources. The workflow ID of the failing task will be visible in the logs, and can be used to remove that workflow as a mitigation. Version 1.23 is not impacted. In this context, a user is an operator of Temporal Server.
References
- github.com/advisories/GHSA-wmxc-v39r-p9wf
- github.com/temporalio/temporal
- github.com/temporalio/temporal/commit/2099dfd945accbf794404c3b8d990d109de19f06
- github.com/temporalio/temporal/commit/679e3dc2ca8bd39e02c760f686cc8807f817bbfd
- github.com/temporalio/temporal/commit/f1fab97129f964dcca17d1f7c344f38666d1ee5f
- github.com/temporalio/temporal/releases
- nvd.nist.gov/vuln/detail/CVE-2024-2689
Detect and mitigate CVE-2024-2689 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →