Lucene search

K
huntrNehalr777E70AD507-1424-463B-BDF1-C4A6FBE6E720
HistorySep 29, 2022 - 7:32 p.m.

No limit in length of "Fullname" parameter results in DOS attack /memory corruption

2022-09-2919:32:17
nehalr777
www.huntr.dev
8
dos attack
memory corruption
fullname parameter
mitigation
fixed length

0.001 Low

EPSS

Percentile

38.1%

Proof of Concept

1)Go to https://rdiffweb-dev.ikus-soft.com/prefs/general endpoint . 
2)You will see a field called "Fullname"
3)Here you will see that there is no limit for the "Fullname" parameter that allows a user to to set a very long string as long as 1 million characters .
4)This may possibly result in a memory corruption/DOS attack.

Mitigation: There must be a fixed length for the "Fullname" parameter upto 128 characters

0.001 Low

EPSS

Percentile

38.1%

Related for E70AD507-1424-463B-BDF1-C4A6FBE6E720