Closed huntr-helper closed 3 years ago
@kettek, if you want more security fixes and patches like this in the future, you can let security researchers know that they can win bounties protecting your repository by copying this small code snippet into your README.md:
[![huntr](https://cdn.huntr.dev/huntr_security_badge.svg)](https://huntr.dev)
π π π
@DEMON1A (https://huntr.dev/users/DEMON1A) has fixed a potential Distributed denial of service vulnerability in your repository π¨. For more information, visit our website (https://huntr.dev/) or click the bounty URL below...
Q | A Version Affected | * Bug Fix | YES Original Pull Request | https://github.com/418sec/shupload/pull/1 Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/other/shupload/1/README.md
User Comments:
π Metadata *
Bounty URL: https://www.huntr.dev/bounties/1-other-shupload/
βοΈ Description *
In Shupload, You're Storing The Original Filenames On The Database Without Validating It. And Since There's No Authentication Required. Remote Attackers Are Able To Insert Huge Values On The Database Then Interact With It And Requesting It From The Server Resulting In Both Client-Side/Server-Side DoS By Increasing The CPU Usage On The Server For The Server And On The Browser For The User.
Attackers Are Able To Freeze The Next Shupload Run By Inserting Huge Values Into The Database. So When
./shupload
Is Running. It Will Take a Lot Of Time Loading The Data From The Database Then Start. Until The Data Is Loaded The Program Won't Start. Multiple Users Doing The Same Action Can Perform a DDoS Attack On The Server.π» Technical Description *
h.Filename
To Check If It's Larger Than 100 Character. If It's Then Nothing Gonna Be Savedπ Proof of Concept (PoC) *
π₯ Proof of Fix (PoF) *
π User Acceptance Testing (UAT)
π Relates to...