-
Notifications
You must be signed in to change notification settings - Fork 250
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Python]: DOS through Decompression #777
Comments
hello @amammad do you have a database for CVE-2023-22898 |
Your submission is now in status Test run. For information, the evaluation workflow is the following: |
Your submission is now in status Query review. For information, the evaluation workflow is the following: |
Your submission is now in status Final decision. For information, the evaluation workflow is the following: |
Created Hackerone report 2375747 for bounty 551597 : [777] [Python]: DOS through Decompression |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
Query PR
github/codeql#13557
Language
Python
CVE(s) ID list
CWE
No response
Report
Extracting Compressed files with any compression algorithm like gzip can cause to denial of service attacks. Attackers can compress a huge file which created by repeated similar byte and convert it to a small compressed file.
Added modeling for multiple CLI third parties.
I've added FileAndFormRemoteFlowSource module which is related to all queries that need a file as their user provided remote flow sources. in this module I added support of file and form of FastAPI framework.
I tried my best to add as much sanitizers as possible. if you have another idea about sanitizers I can write more sanitizers too.
Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).
Blog post link
No response
The text was updated successfully, but these errors were encountered: