mywalkb / LSPosed_mod

My changes to LSPosed
GNU General Public License v3.0
3.63k stars 167 forks source link

Protect `readLine()` against DoS #144

Closed zcarroll4 closed 1 month ago

zcarroll4 commented 2 months ago

This change hardens all BufferedReader#readLine() operations against memory exhaustion.

There is no way to call readLine() safely since it is, by its nature, a read that must be terminated by the stream provider. Furthermore, a stream of data provided by an untrusted source could lead to a denial of service attack, as attackers can provide an infinite stream of bytes until the process runs out of memory.

Fixing it is straightforward using an API which limits the amount of expected characters to some sane limit. This is what our changes look like:

+ import io.github.pixee.security.BoundedLineReader;
  ...
  BufferedReader reader = getReader();
- String line = reader.readLine(); // unlimited read, can lead to DoS
+ String line = BoundedLineReader.readLine(reader, 5_000_000); // limited to 5MB

:x: The following packages couldn't be installed automatically, probably because the dependency manager is unsupported. Please install them manually:

Gradle dependencies { implementation("io.github.pixee:java-security-toolkit:1.2.0") }
Maven io.github.pixee java-security-toolkit 1.2.0
More reading * [https://vulncat.fortify.com/en/detail?id=desc.dataflow.abap.denial_of_service](https://vulncat.fortify.com/en/detail?id=desc.dataflow.abap.denial_of_service) * [https://cwe.mitre.org/data/definitions/400.html](https://cwe.mitre.org/data/definitions/400.html)

🧚🤖 Powered by Pixeebot

Feedback | Community | Docs | Codemod ID: pixee:java/limit-readline