Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

320159 fixes part 1 #137

Merged
merged 2 commits into from Apr 5, 2019
Merged

320159 fixes part 1 #137

merged 2 commits into from Apr 5, 2019

Conversation

ChALkeR
Copy link
Contributor

@ChALkeR ChALkeR commented Apr 3, 2019

Partial fix to lower DoS possibilities. It does not fix all the issues though, but it makes things better and should not break anything.

Ref: https://hackerone.com/reports/320159

Extracted from my private repo.

There are broken sequences like "([^smth])*\s+" or "[^smth]+ *".
This prevents abusing those.
Truncate the useragent to 1000 to avoid reject, ref:
GUI/uas-parser@c33b124

The check in isSafe for the max length is still there as a safeguard.
@ChALkeR
Copy link
Contributor Author

ChALkeR commented Apr 3, 2019

@3rd-Eden I believe this specific fix is independent from uap-core, is trivial, and could be merged as is =).

@3rd-Eden 3rd-Eden merged commit 187c172 into 3rd-Eden:master Apr 5, 2019
@kavitaasiwal
Copy link

@3rd-Eden Is there an expected release date for this fix?

@mjangid-albert
Copy link

mjangid-albert commented Mar 30, 2022

@3rd-Eden Is this fix released?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants