CVE-2025-0182

7.5 HIGH

📋 TL;DR

This vulnerability in danswer-ai/danswer version 0.9.0 allows attackers to cause denial of service through memory exhaustion by sending multiple requests to the /auth/saml/callback endpoint. The issue stems from a vulnerable starlette package dependency via fastapi. Organizations running affected danswer-ai instances are at risk.

💻 Affected Systems

Products:
  • danswer-ai/danswer
Versions: 0.9.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires fastapi dependency with vulnerable starlette package (<=0.49).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to memory exhaustion, potentially affecting all users and requiring system restart.

🟠

Likely Case

Service degradation or temporary unavailability for legitimate users during attack periods.

🟢

If Mitigated

Minimal impact with proper rate limiting and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending multiple requests to specific endpoint; no authentication needed for the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update fastapi to version 0.115.3 or later

Vendor Advisory: https://huntr.com/bounties/969b8056-b66c-4d70-8f77-04c1cbdc1d1a

Restart Required: No

Instructions:

1. Update fastapi dependency to version 0.115.3 or later. 2. Verify starlette package is updated to version >0.49. 3. Test the application functionality.

🔧 Temporary Workarounds

Rate limiting on vulnerable endpoint

all

Implement rate limiting on /auth/saml/callback endpoint to prevent memory exhaustion attacks

Disable SAML authentication

all

Temporarily disable SAML authentication if not required

🧯 If You Can't Patch

  • Implement strict rate limiting on all endpoints
  • Deploy WAF rules to block excessive requests to /auth/saml/callback

🔍 How to Verify

Check if Vulnerable:

Check fastapi version: if <0.115.3 and using danswer-ai 0.9.0, system is vulnerable

Check Version:

pip show fastapi && pip show starlette

Verify Fix Applied:

Verify fastapi version is >=0.115.3 and starlette version is >0.49

📡 Detection & Monitoring

Log Indicators:

  • High frequency of requests to /auth/saml/callback
  • Memory usage spikes
  • Application crash/restart logs

Network Indicators:

  • Unusual traffic patterns to SAML callback endpoint
  • Multiple requests from single IP to vulnerable endpoint

SIEM Query:

source="danswer-logs" AND endpoint="/auth/saml/callback" AND count > 1000 per minute

🔗 References

📤 Share & Export