漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
free5GC UDM vulnerable to null byte injection in URL path parameters causing 500 Internal Server Error
Vulnerability Description
Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions prior to 1.4.2 are vulnerable to null byte injection in URL path parameters. A remote attacker can inject null bytes (URL-encoded as %00) into the supi path parameter of the UDM's Nudm_SubscriberDataManagement API. This causes URL parsing failure in Go's net/url package with the error "invalid control character in URL", resulting in a 500 Internal Server Error. This null byte injection vulnerability can be exploited for denial of service attacks. When the supi parameter contains null characters, the UDM attempts to construct a URL for UDR that includes these control characters. Go's URL parser rejects them, causing the request to fail with 500 instead of properly validating input and returning 400 Bad Request. This issue has been fixed in version 1.4.2.
CVSS Information
N/A
Vulnerability Type
空字节或NULL字符转义处理不恰当
Vulnerability Title
free5GC 安全漏洞
Vulnerability Description
free5GC是free5GC开源的一个第 5 代 (5G) 移动核心网络的开源项目。 Free5GC 1.4.2之前版本存在安全漏洞,该漏洞源于UDM的Nudm_SubscriberDataManagement API的supi路径参数存在空字节注入,可能导致拒绝服务攻击。
CVSS Information
N/A
Vulnerability Type
N/A