Out-of-bounds Write in cortezaproject/corteza-server
Reported on
Nov 8th 2021
Description
There's no bound limit to the number of "characters/special characters" in the name field of the user.
Vulnerable Field: Full Name
By sending a very long string it’s possible to cause a denial a service attack on the server. This may lead to the website becoming unavailable or unresponsive. The bulk (unbounded) input will store on the server & the DoS attack influences both server-side and client-side.
Proof of Concept
Reproduction steps
Go to: https://latest.cortezaproject.org/auth
Vulnerable field: Full Name
Update profile
Done
Impact
This vulnerability is capable of Bringing down both the availability of the Client & server-side resources. Application-Level DoS
PoC Link:
https://drive.google.com/drive/folders/1xKb1F2lZ7OJ0ySWgNr3yEHWiTOcHxBZ1?usp=sharing
Please NOTE:
Those bulk names in PoC are decently made for clarification. It's changed into short after taking the screenshot itself.
It might be worth getting in touch with the maintainer and softly checking if they are aware of the report.
I do apologise for poor responsiveness; I will try to be more active with updates from now on