No limit in length of "Token name" parameter results in DOS attack /memory corruption in ikus060/rdiffweb
Valid
Reported on
Sep 29th 2022
Proof of Concept
1)Go to https://rdiffweb-dev.ikus-soft.com/prefs/tokens endpoint .
2)You will see a field called "Token name"
3)Here you will see that there is no limit for the "Token name" parameter that allows a user to to set a very long string as long as 1 million characters .
4)This may possibly result in a memory corruption/DOS attack.
Mitigation: There must be a fixed length for the "Token name" parameter upto 128 characters
# Impact
Allows an attacker to set a "Token name" with long string leading to memory corruption/possible DOS attack
We are processing your report and will contact the
ikus060/rdiffweb
team within 24 hours.
a year ago
The researcher's credibility has increased: +7
to join this conversation