cxf-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Colm O hEigeartaigh (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (CXF-7507) DoS Vulnerability in cxf-core
Date Fri, 15 Sep 2017 15:33:00 GMT

    [ https://issues.apache.org/jira/browse/CXF-7507?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16168024#comment-16168024
] 

Colm O hEigeartaigh commented on CXF-7507:
------------------------------------------

We should put a limit on the length of the parameter...

> DoS Vulnerability in cxf-core
> -----------------------------
>
>                 Key: CXF-7507
>                 URL: https://issues.apache.org/jira/browse/CXF-7507
>             Project: CXF
>          Issue Type: Bug
>          Components: Core
>    Affects Versions: 3.1.11
>            Reporter: kevin.wang
>            Priority: Critical
>
> There is one possible DOS vulnerability in the code ContentDisposition constructor. 
> In the codes , it will use the pattern to parse MIME content-disposition. 
> if the content-disposition content has more than 50000 chars,one radical example , 1
million , CPU usage of any web service 
> would be used up and reach over more than 98%.
> please consider solve this issue asap.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Mime
View raw message