{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-32874","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-04-19T14:07:11.229Z","datePublished":"2024-05-09T14:20:04.499Z","dateUpdated":"2024-08-02T02:20:35.681Z"},"containers":{"cna":{"title":"In Frigate, Malicious Long Unicode filenames may cause a Multiple Application-level Denial of Service","problemTypes":[{"descriptions":[{"cweId":"CWE-770","lang":"en","description":"CWE-770: Allocation of Resources Without Limits or Throttling","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-w4h6-9wrp-v5jq","tags":["x_refsource_CONFIRM"],"url":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-w4h6-9wrp-v5jq"},{"name":"https://github.com/blakeblackshear/frigate/commit/cc851555e4029647986dccc8b8ecf54afee31442","tags":["x_refsource_MISC"],"url":"https://github.com/blakeblackshear/frigate/commit/cc851555e4029647986dccc8b8ecf54afee31442"}],"affected":[{"vendor":"blakeblackshear","product":"frigate","versions":[{"version":"<= 0.13.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-05-09T14:20:56.118Z"},"descriptions":[{"lang":"en","value":"Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Below 0.13.2 Release, when uploading a file or retrieving the filename, a user may intentionally use a large Unicode filename which would lead to a application-level denial of service. This is due to no limitation set on the length of the filename and the costy use of the Unicode normalization with the form NFKD under the hood of `secure_filename()`."}],"source":{"advisory":"GHSA-w4h6-9wrp-v5jq","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"frigate","product":"frigate","cpes":["cpe:2.3:a:frigate:frigate:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"0.13.2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-05-10T18:13:38.649226Z","id":"CVE-2024-32874","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-06T17:35:41.883Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T02:20:35.681Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-w4h6-9wrp-v5jq","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-w4h6-9wrp-v5jq"},{"name":"https://github.com/blakeblackshear/frigate/commit/cc851555e4029647986dccc8b8ecf54afee31442","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/blakeblackshear/frigate/commit/cc851555e4029647986dccc8b8ecf54afee31442"}]}]}}