CVE-2024-35238

5.3 MEDIUM

📋 TL;DR

Minder versions prior to 0.0.51 are vulnerable to a denial-of-service attack where an attacker can crash the server by forcing it to process excessively large responses from GitHub attestation endpoints. This affects all Minder deployments using vulnerable versions, potentially denying service to legitimate users. The vulnerability requires attacker access to configure Minder settings.

💻 Affected Systems

Products:
  • Stacklok Minder
Versions: All versions prior to 0.0.51
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when Minder is configured to fetch GitHub attestations

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of Minder platform, disrupting software supply chain security monitoring for all users

🟠

Likely Case

Intermittent service disruptions when attackers target specific Minder instances

🟢

If Mitigated

No impact with proper response size limits and input validation

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires attacker to have Minder account and ability to configure packages with malicious attestations

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.0.51

Vendor Advisory: https://github.com/stacklok/minder/security/advisories/GHSA-8fmj-33gw-g7pw

Restart Required: Yes

Instructions:

1. Stop Minder service. 2. Update to version 0.0.51 or later. 3. Restart Minder service. 4. Verify service is running correctly.

🔧 Temporary Workarounds

Limit GitHub attestation access

all

Restrict which GitHub organizations/packages Minder can fetch attestations from

Configure Minder to only fetch attestations from trusted sources

Implement response size limits

linux

Add middleware or proxy to enforce maximum response sizes for external API calls

Configure reverse proxy (nginx/haproxy) with client_max_body_size directive

🧯 If You Can't Patch

  • Disable GitHub attestation verification feature in Minder configuration
  • Implement network segmentation to isolate Minder from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check Minder version: if version < 0.0.51, system is vulnerable

Check Version:

minder --version or check deployment manifest/configuration

Verify Fix Applied:

Verify Minder version is 0.0.51 or later and test attestation fetching with large responses

📡 Detection & Monitoring

Log Indicators:

  • Minder process crashes
  • Out of memory errors in logs
  • Repeated failed attestation requests

Network Indicators:

  • Large responses from GitHub API endpoints to Minder
  • Unusual patterns in attestation requests

SIEM Query:

source="minder" AND ("panic" OR "out of memory" OR "attestation" AND "failed")

🔗 References

📤 Share & Export