| ID |
CVE-2017-16129
|
| Sažetak |
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to. |
| Reference |
|
| CVSS |
| Base: | 7.1 |
| Impact: | 6.9 |
| Exploitability: | 8.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
NONE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:M/Au:N/C:N/I:N/A:C |
| Zadnje važnije ažuriranje |
09-10-2019 - 23:24 |
| Objavljeno |
07-06-2018 - 02:29 |