superagent におけるリソースの枯渇に関する脆弱性
| Title |
superagent におけるリソースの枯渇に関する脆弱性
|
| Summary |
superagent には、リソースの枯渇に関する脆弱性が存在します。
|
| Possible impacts |
サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Oct. 19, 2017, midnight |
| Registration Date |
Aug. 15, 2018, 2:52 p.m. |
| Last Update |
Aug. 15, 2018, 2:52 p.m. |
|
CVSS3.0 : 警告
|
| Score |
5.9
|
| Vector |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
CVSS2.0 : 危険
|
| Score |
7.1
|
| Vector |
AV:N/AC:M/Au:N/C:N/I:N/A:C |
Affected System
| superagent project |
|
superagent
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年08月15日] 掲載 |
Aug. 15, 2018, 2:52 p.m. |
NVD Vulnerability Information
CVE-2017-16129
| Summary |
The HTTP client module superagent is vulnerable to ZIP bomb attacks. In a ZIP bomb attack, the HTTP server replies with a compressed response that becomes several magnitudes larger once uncompressed. If a client does not take special care when processing such responses, it may result in excessive CPU and/or memory consumption. An attacker might exploit such a weakness for a DoS attack. To exploit this the attacker must control the location (URL) that superagent makes a request to.
|
| Publication Date |
June 7, 2018, 11:29 a.m. |
| Registration Date |
Jan. 26, 2021, 1:18 p.m. |
| Last Update |
Nov. 21, 2024, 12:15 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:superagent_project:superagent:*:*:*:*:*:node.js:*:* |
|
|
|
3.7.0 |
Related information, measures and tools
Common Vulnerabilities List