superagent vulnerable to zip bomb attacks
Moderate severity
GitHub Reviewed
Published
Aug 9, 2018
to the GitHub Advisory Database
•
Updated Sep 8, 2023
Description
Published to the GitHub Advisory Database
Aug 9, 2018
Reviewed
Jun 16, 2020
Last updated
Sep 8, 2023
Affected versions of
superagent
do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a ZIP bomb attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed.This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition.
Recommendation
Update to version 3.7.0 or later.
References