free5GC has Improper Input Validation in UDM, Leading to Information Exposure
Description
free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the ueId parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system implementation details and can aid in service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM service may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.
Affected products
2- free5gc/udmv5Range: <= 1.4.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/free5gc/free5gc/issues/751mitrex_refsource_MISC
- github.com/free5gc/free5gc/issues/76mitrex_refsource_MISC
- github.com/free5gc/free5gc/security/advisories/GHSA-pwxh-4qh4-hgpqmitrex_refsource_CONFIRM
- github.com/free5gc/udm/commit/504b14458d156558b3c0ade7107b86b3d5e72998mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.