Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6176

Опубликовано: 31 окт. 2025
Источник: redhat
CVSS3: 7.5

Описание

Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

Отчет

This vulnerability is rated Important for Red Hat products. The flaw in Scrapy's brotli decompression implementation allows remote attackers to trigger a denial of service by sending specially crafted brotli-compressed data. This can lead to excessive memory consumption and system instability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/controller-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/ee-supported-rhel9Not affected
Red Hat Ansible Automation Platform 2ansible-automation-platform-tech-preview/automation-dashboard-rhel9Affected
Red Hat Ansible Automation Platform 2automation-controllerNot affected
Red Hat Ansible Automation Platform 2python3.11-brotliNot affected
Red Hat Ansible Automation Platform 2python3x-brotliOut of support scope
Red Hat JBoss Core ServicesbrotliNot affected
Red Hat Satellite 6python3.12-brotliNot affected
Red Hat Satellite 6satellite:el8/python-brotliAffected
Red Hat Update Infrastructure 4 for Cloud Providerspython-brotliNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2408762Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
5 месяцев назад

Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

CVSS3: 7.5
nvd
5 месяцев назад

Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

CVSS3: 7.5
debian
5 месяцев назад

Scrapy versions up to 2.13.2 are vulnerable to a denial of service (Do ...

rocky
около 2 месяцев назад

Important: brotli security update

rocky
около 2 месяцев назад

Important: brotli security update

7.5 High

CVSS3

Уязвимость CVE-2025-6176