Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-59043

Опубликовано: 17 окт. 2025
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

OpenBao is an open source identity-based secrets management system. In OpenBao versions prior to 2.4.1, JSON objects after decoding may use significantly more memory than their serialized version. It is possible to craft a JSON payload to maximize the factor between serialized memory usage and deserialized memory usage, similar to a zip bomb, with factors reaching approximately 35. This can be used to circumvent the max_request_size configuration parameter which is intended to protect against denial of service attacks. The request body is parsed into a map very early in the request handling chain before authentication, which means an unauthenticated attacker can send a specifically crafted JSON object and cause an out-of-memory crash. Additionally, for requests with large numbers of strings, the audit subsystem can consume large quantities of CPU. The vulnerability is fixed in version 2.4.1.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*
Версия до 2.4.1 (исключая)

EPSS

Процентиль: 33%
0.00133
Низкий

7.5 High

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
debian
4 месяца назад

OpenBao is an open source identity-based secrets management system. In ...

CVSS3: 7.5
github
4 месяца назад

OpenBao has potential Denial of Service vulnerability when processing malicious unauthenticated JSON requests

EPSS

Процентиль: 33%
0.00133
Низкий

7.5 High

CVSS3

Дефекты

CWE-400