Skip to content

fix: upgrade grpc to v1.79.3 to fix CVE auth bypass (SECVULN-40751)#40

Closed
TejaswiniV1 wants to merge 1 commit into
mainfrom
fix/SECVULN-40751-grpc-auth-bypass
Closed

fix: upgrade grpc to v1.79.3 to fix CVE auth bypass (SECVULN-40751)#40
TejaswiniV1 wants to merge 1 commit into
mainfrom
fix/SECVULN-40751-grpc-auth-bypass

Conversation

@TejaswiniV1
Copy link
Copy Markdown

@TejaswiniV1 TejaswiniV1 commented Apr 17, 2026

Description

What does this PR do ?
This PR addresses a critical authorization bypass vulnerability in gRPC‑Go (CVE‑2026‑33186).
Older versions of gRPC‑Go allowed malformed HTTP/2 :path values without a leading slash, which could bypass path‑based authorization rules under certain policy configurations.

Fix :
1.Upgraded google.golang.org/grpc from v1.56.3 to v1.79.3
2.This version rejects malformed :path headers before routing or authorization logic runs, fully mitigating the vulnerability upstream
3.No application‑level logic changes were required

Key Changes :
1.Dependency upgrade: google.golang.org/grpc v1.79.3
2.Related transitive dependency updates via go mod tidy
3.No functional or behavioral changes to plugin logic

Verification

  1. go build ./... - completed successfully
  2. go test ./... - completed successfully (no test files present)

Jira: https://hashicorp.atlassian.net/browse/SECVULN-40751

@TejaswiniV1 TejaswiniV1 requested a review from a team as a code owner April 17, 2026 09:05
@TejaswiniV1
Copy link
Copy Markdown
Author

Closing this PR in favor of a new PR linked to VAULT‑44205 as requested. The fix remains the same.

@TejaswiniV1 TejaswiniV1 deleted the fix/SECVULN-40751-grpc-auth-bypass branch April 20, 2026 14:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant