Skip to content

[Go]: DOS through Decompression #773

Closed
@am0o0

Description

@am0o0

Query PR

github/codeql#13553

Language

Go

CVE(s) ID list

Report

Extracting Compressed files with any compression algorithm like gzip can cause to denial of service attacks. Attackers can compress a huge file which created by repeated similar byte and convert it to a small compressed file.
Added modeling for multiple Go CLI third parties.
Added modeling for User controlled remote sources for multipart/file uploads.
The only good sanitizer that I found is using of "io.LimitReader" and "io.CopyN" which the query will sanitize the results that contain these two methods.

Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).

Yes

Metadata

Metadata

Assignees

Labels

All For OneSubmissions to the All for One, One for All bounty

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions