CVE-2023-25822

ReportPortal DoS vulnerability on creating a Launch with too many recursively nested elements

Description

ReportPortal is an AI-powered test automation platform. Prior to version 5.10.0 of the `com.epam.reportportal:service-api` module, corresponding to ReportPortal version 23.2, the ReportPortal database becomes unstable and reporting almost fully stops except for small launches with approximately 1 test inside when the test_item.path field is exceeded the allowable `ltree` field type indexing limit (path length>=120, approximately recursive nesting of the nested steps). REINDEX INDEX path_gist_idx and path_idx aren't helped. The problem was fixed in `com.epam.reportportal:service-api` module version 5.10.0 (product release 23.2), where the maximum number of nested elements were programmatically limited. A workaround is available. After deletion of the data with long paths, and reindexing both indexes (path_gist_idx and path_idx), the database becomes stable and ReportPortal works properly.

Category

6.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.29%
Vendor Advisory github.com
Affected: reportportal reportportal
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-25822?
CVE-2023-25822 has been scored as a medium severity vulnerability.
How to fix CVE-2023-25822?
To fix CVE-2023-25822, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-25822 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-25822 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-25822?
CVE-2023-25822 affects reportportal reportportal.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.