CVE-2023-25822 involves a Denial of Service (DoS) flaw in ReportPortal. Learn about the impact, mitigation steps, and technical details of this vulnerability.
This CVE pertains to a Denial of Service (DoS) vulnerability discovered in ReportPortal related to creating a Launch with too many recursively nested elements.
Understanding CVE-2023-25822
This vulnerability affects ReportPortal, an AI-powered test automation platform, specifically versions prior to 5.10.0 of the
com.epam.reportportal:service-api
module, corresponding to ReportPortal version 23.2.
What is CVE-2023-25822?
The vulnerability occurs when the ReportPortal database becomes unstable and reporting almost fully stops, except for small launches with approximately 1 test inside, due to exceeding the allowable
ltree
field type indexing limit. This is caused by recursive nesting of the nested steps, leading to instability in the database.
The Impact of CVE-2023-25822
The impact of this vulnerability is the unavailability of reporting features in ReportPortal due to database instability. This can disrupt testing processes and impact the overall functionality of the platform for users.
Technical Details of CVE-2023-25822
This section delves into the specific technical aspects of the CVE, including the vulnerability description, affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
The vulnerability in ReportPortal is caused by exceeding the allowed
ltree
field type indexing limit due to recursive nesting of nested steps, leading to database instability and reporting features becoming unavailable.
Affected Systems and Versions
The affected system is ReportPortal with versions prior to 5.10.0 of the
com.epam.reportportal:service-api
module, corresponding to ReportPortal version 23.2. Systems within this version range are susceptible to the DoS vulnerability.
Exploitation Mechanism
The exploitation of this vulnerability involves creating a Launch with too many recursively nested elements in ReportPortal, exceeding the allowable
ltree
field type indexing limit, leading to database instability and the unavailability of reporting features.
Mitigation and Prevention
In order to mitigate the risks associated with CVE-2023-25822, users and organizations are advised to take immediate steps and adopt long-term security practices to enhance protection against such vulnerabilities.
Immediate Steps to Take
Users should update the affected
com.epam.reportportal:service-api
module to version 5.10.0 or newer, which includes the fix for the vulnerability. Additionally, implementing the workaround by deleting data with long paths and reindexing both indexes can help stabilize the database and restore proper functionality.
Long-Term Security Practices
To prevent similar vulnerabilities in the future, organizations should prioritize regular security assessments, threat monitoring, and timely application of patches and updates across their systems and software components.
Patching and Updates
Users are encouraged to stay informed about security advisories and updates released by ReportPortal. Applying patches promptly, especially those addressing known vulnerabilities like CVE-2023-25822, is crucial in maintaining a secure testing environment and preventing potential exploits.