| 제목 | OWASP DefectDojo <= 2.55.4 Denial of Service |
|---|
| 설명 | Multiple components within DefectDojo, specifically SonarQubeParser and MSDefenderParser, are vulnerable to a Zip Bomb (Denial of Service) attack. These parsers employ an unsafe file reading pattern (input_zip.read(name)) when processing user-uploaded ZIP archives. This method indiscriminately loads the entire uncompressed content of files into the server's memory without validating the size or compression ratio. An authenticated attacker who has the permission to upload findings can exploit this by uploading a small, highly compressed ZIP file (e.g., ~5MB) that expands to a massive size (e.g., 5GB or more) upon extraction. This triggers an Out-Of-Memory (OOM) condition, causing the application process to crash and leading to a Denial of Service.
Fixation PR: https://github.com/DefectDojo/django-DefectDojo/pull/14408 |
|---|
| 원천 | ⚠️ https://github.com/henrrrychau/cve-bug-bounty/blob/main/dfdj_zip_bomb_dos_oom/dfdj_zip_bomb_dos_oom.md |
|---|
| 사용자 | h3nrrrych4u (UID 95805) |
|---|
| 제출 | 2026. 02. 28. AM 07:34 (1 월 ago) |
|---|
| 모더레이션 | 2026. 03. 08. PM 06:23 (8 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 349782 [OWASP DefectDojo 까지 2.55.4 SonarQubeParser/MSDefenderParser parser.py input_zip.read 서비스 거부] |
|---|
| 포인트들 | 20 |
|---|