Lucene search

K
githubGitHub Advisory DatabaseGHSA-RMQP-MVV2-54C6
HistoryFeb 22, 2024 - 12:30 p.m.

Apache Answer Unrestricted Upload of File with Dangerous Type vulnerability

2024-02-2212:30:56
CWE-434
GitHub Advisory Database
github.com
11
apache answer
unrestricted upload
dangerous type
pixel flood
out of memory
version 1.2.5
security patch

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

9.0%

Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer. This issue affects Apache Answer through 1.2.1.

Pixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in userΒ can cause such an attack by uploading an image when posting content.

Users are recommended to upgrade to version 1.2.5, which fixes the issue.

Affected configurations

Vulners
Node
apacheanswerRange<1.2.5
VendorProductVersionCPE
apacheanswer*cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

9.0%