Server side request forgery lead to denial of service in hay-kot/mealie

Valid

Reported on

May 29th 2022


Description

In this case if a attacker try to load a huge file then server will try to load the file and eventually server use its all memory which will dos the server

Proof of Concept

1.Goto https://demo.mealie.io/recipe/create/url?recipe_import_url=https%3A%2F%2Fspeed.hetzner.de%2F10GB.bin&import_keywords_as_tags=1

2.Send this request 4-5 times.

3.It will try to load file and dos the server.

#POC :-

https://youtu.be/qXAH_8SypTA

Impact

Deniel of service

We are processing your report and will contact the hay-kot/mealie team within 24 hours. 2 months ago
We created a GitHub Issue asking the maintainers to create a SECURITY.md 2 months ago
We have contacted a member of the hay-kot/mealie team and are waiting to hear back 2 months ago
We have sent a follow up to the hay-kot/mealie team. We will try again in 7 days. 2 months ago
We have sent a second follow up to the hay-kot/mealie team. We will try again in 10 days. 2 months ago
We have sent a third and final follow up to the hay-kot/mealie team. This report is now considered stale. a month ago
Hayden validated this vulnerability a month ago
Distorted_Hacker has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
We have sent a fix follow up to the hay-kot/mealie team. We will try again in 7 days. a month ago
We have sent a second fix follow up to the hay-kot/mealie team. We will try again in 10 days. a month ago
We have sent a third and final fix follow up to the hay-kot/mealie team. This report is now considered stale. 17 days ago
Hayden confirmed that a fix has been merged on 13850c 2 days ago
Hayden has been awarded the fix bounty
to join this conversation