Server side request forgery lead to denial of service in hay-kot/mealie
Valid
Reported on
May 29th 2022
Description
In this case if a attacker try to load a huge file then server will try to load the file and eventually server use its all memory which will dos the server
Proof of Concept
1.Goto https://demo.mealie.io/recipe/create/url?recipe_import_url=https%3A%2F%2Fspeed.hetzner.de%2F10GB.bin&import_keywords_as_tags=1
2.Send this request 4-5 times.
3.It will try to load file and dos the server.
#POC :-
https://youtu.be/qXAH_8SypTA
Impact
Deniel of service
We are processing your report and will contact the
hay-kot/mealie
team within 24 hours.
a year ago
We created a
GitHub Issue
asking the maintainers to create a
SECURITY.md
a year ago
We have contacted a member of the
hay-kot/mealie
team and are waiting to hear back
a year ago
We have sent a
follow up to the
hay-kot/mealie
team.
We will try again in 7 days.
a year ago
We have sent a
second
follow up to the
hay-kot/mealie
team.
We will try again in 10 days.
a year ago
We have sent a
third and final
follow up to the
hay-kot/mealie
team.
This report is now considered stale.
a year ago
The researcher's credibility has increased: +7
We have sent a
fix follow up to the
hay-kot/mealie
team.
We will try again in 7 days.
a year ago
We have sent a
second
fix follow up to the
hay-kot/mealie
team.
We will try again in 10 days.
a year ago
We have sent a
third and final
fix follow up to the
hay-kot/mealie
team.
This report is now considered stale.
10 months ago
to join this conversation