Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rjcg-56ph-3qvg

Опубликовано: 30 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

EPSS

Процентиль: 8%
0.00028
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

CVSS3: 5.3
redhat
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

CVSS3: 5.3
nvd
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

msrc
4 месяца назад

Lack of limit when parsing cookies can cause memory exhaustion in net/http

CVSS3: 5.3
debian
5 месяцев назад

Despite HTTP headers having a default limit of 1MB, the number of cook ...

EPSS

Процентиль: 8%
0.00028
Низкий

5.3 Medium

CVSS3