CVE Vulnerabilities

CVE-2017-16129

Improper Handling of Highly Compressed Data (Data Amplification)

Published: Jun 07, 2018 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.1 HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.

Weakness

The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.

Affected Software

NameVendorStart VersionEnd Version
SuperagentSuperagent_project*3.7.0 (excluding)
Node-superagentUbuntubionic*
Node-superagentUbuntuesm-apps/bionic*
Node-superagentUbuntuesm-apps/xenial*
Node-superagentUbuntutrusty*
Node-superagentUbuntuupstream*
Node-superagentUbuntuxenial*

References