{"id":"GHSA-75r6-6jg8-pfcq","summary":"octo-sts vulnerable to unauthenticated attacker causing unbounded CPU and memory usage","details":"### Impact\nThis vulnerability can spike the resource utilization of the STS service, and combined with a significant traffic volume could potentially lead to a denial of service.\n\n### Patches\nThis vulnerability existed in the repository at HEAD, we will cut a 0.1.0 release with the fix. \n\n### Workarounds\nNone\n\n### References\nNone\n","aliases":["CVE-2024-34079","GO-2024-2833"],"modified":"2026-02-04T03:51:12.532909Z","published":"2024-05-13T14:10:08Z","related":["CGA-2rvh-3ccm-h3rx"],"database_specific":{"nvd_published_at":"2024-05-14T15:38:29Z","github_reviewed":true,"severity":"LOW","cwe_ids":["CWE-400"],"github_reviewed_at":"2024-05-13T14:10:08Z"},"references":[{"type":"WEB","url":"https://github.com/octo-sts/app/security/advisories/GHSA-75r6-6jg8-pfcq"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-34079"},{"type":"WEB","url":"https://github.com/octo-sts/app/commit/74ba874c017cf973edd6711144cf4399a9fcff57"},{"type":"PACKAGE","url":"https://github.com/octo-sts/app"}],"affected":[{"package":{"name":"github.com/octo-sts/app","ecosystem":"Go","purl":"pkg:golang/github.com/octo-sts/app"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.1.0"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-75r6-6jg8-pfcq/GHSA-75r6-6jg8-pfcq.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}