Описание
Billion laughs attack (XML bomb)
Impact
Opencast is vulnerable to the Billion laughs attack which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request.
Consider an XML file (createMediaPackage.xml) like this:
Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory:
Additional notes:
- You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text.
- Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system.
- To exploit this, users need to have ingest privileges, limiting the group of potential attackers
Patches
The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch.
Workarounds
There is no known workaround for this issue.
References
- Billion laughs attack explained
- For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________
For more information
If you have any questions or comments about this advisory:
- Open an issue in our issue tracker
- Email us at security@opencast.org
Пакеты
org.opencastproject:opencast-kernel
< 9.6
9.6
Связанные уязвимости
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. To exploit this, users need to have ingest privileges, limiting the group of potential attackers The problem has been fixed in Opencast 9.6. There is no known workaround for this issue.