漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Unbounded buffer accumulation in multipart header parsing causes denial of service in plug
Vulnerability Description
Allocation of Resources Without Limits or Throttling vulnerability in plug_project plug allows denial of service via unbounded buffer accumulation in multipart header parsing. 'Elixir.Plug.Conn':read_part_headers/2 in lib/plug/conn.ex does not obey its :length parameter. There is no upper bound on the size of the accumulated buffer. By contrast, the sibling function read_part_body has an explicit byte_size(acc) > length guard that stops accumulation once a limit is reached. No such guard exists in read_part_headers. An unauthenticated remote attacker can exhaust server memory by sending a crafted multipart/form-data request, causing a denial of service. This issue affects plug from 1.4.0 before 1.15.4, 1.16.3, 1.17.1, 1.18.2, and 1.19.2.
CVSS Information
N/A
Vulnerability Type
不加限制或调节的资源分配
Vulnerability Title
Plug 安全漏洞
Vulnerability Description
Plug是elixir-plug开源的一个面向Elixir生态的Web应用中间件与连接规范库。 Plug 1.15.4之前版本、1.16.3之前版本、1.17.1之前版本、1.18.2之前版本和1.19.2之前版本存在安全漏洞,该漏洞源于多部分标头解析中缓冲区累积无限制,可能导致未经身份验证的远程攻击者通过发送特制的multipart/form-data请求耗尽服务器内存。
CVSS Information
N/A
Vulnerability Type
N/A