Описание
kin-openapi is a Go project for handling OpenAPI files. Prior to 0.131.0, when validating a request with a multipart/form-data schema, if the OpenAPI schema allows it, an attacker can upload a crafted ZIP file (e.g., a ZIP bomb), causing the server to consume all available system memory. The root cause comes from the ZipFileBodyDecoder, which is registered automatically by the module (contrary to what the documentation says). This vulnerability is fixed in 0.131.0.
A flaw was found in kin-openapi. This vulnerability allows excessive memory consumption via upload of a crafted ZIP file (a "ZIP bomb").
Меры по смягчению последствий
Disable any endpoints in your OpenAPI schema that allows multipart/form-data or allows the uploading of a zipfile.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Advanced Cluster Management for Kubernetes 2 | flightctl | Affected | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/acm-flightctl-api-rhel9 | Affected | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/acm-flightctl-periodic-rhel9 | Affected | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/acm-flightctl-worker-rhel9 | Affected | ||
Red Hat Enterprise Linux 10 | osbuild-composer | Not affected | ||
Red Hat Enterprise Linux 8 | osbuild-composer | Not affected | ||
Red Hat Enterprise Linux 9 | osbuild-composer | Not affected | ||
Red Hat OpenShift Container Platform 4 | o-cloud-hwmgr-plugin-operator-bundle-container | Affected | ||
Red Hat OpenShift Container Platform 4 | o-cloud-manager-operator-bundle-container | Affected | ||
Red Hat OpenShift Container Platform 4 | oran-o2ims-operator-bundle-container | Affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
kin-openapi is a Go project for handling OpenAPI files. Prior to 0.131.0, when validating a request with a multipart/form-data schema, if the OpenAPI schema allows it, an attacker can upload a crafted ZIP file (e.g., a ZIP bomb), causing the server to consume all available system memory. The root cause comes from the ZipFileBodyDecoder, which is registered automatically by the module (contrary to what the documentation says). This vulnerability is fixed in 0.131.0.
Improper Handling of Highly Compressed Data (Data Amplification) in github.com/getkin/kin-openapi/openapi3filter
7.5 High
CVSS3