Lucene search

K
githubGitHub Advisory DatabaseGHSA-H6RP-MPRM-XGCQ
HistorySep 21, 2023 - 5:06 p.m.

plone.rest vulnerable to Denial of Service when ++api++ is used many times

2023-09-2117:06:37
CWE-400
CWE-770
GitHub Advisory Database
github.com
12
plone.rest
denial of service
vulnerability
patches
series 1.x
frontend web server
nginx
apache
redirect

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.2%

Impact

When the ++api++ traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive.

Patches

Patches will be released in plone.rest 2.0.1 and 3.0.1. Series 1.x is not affected.

Workarounds

In your frontend web server (nginx, Apache) you can redirect /++api++/++api++ to /++api++.

Affected configurations

Vulners
Node
plone.restMatch3.0.0
OR
plone.restRange<2.0.1
CPENameOperatorVersion
plone.resteq3.0.0
plone.restlt2.0.1

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.2%

Related for GHSA-H6RP-MPRM-XGCQ