Skip to content

Malicious Long Unicode filenames may cause an Application-level Denial of Service

Moderate
certsocietegenerale published GHSA-9gw7-hxgx-f6rv Apr 29, 2024

Package

certsocietegenerale/fame (Github)

Affected versions

commit<1340418

Patched versions

commit>=1340418

Description

When uploading a file on FAME, a user may intentionally use a large Unicode string which would lead to an application-level slowness/denial of service. This is due to no limitation being set on the length of the filename and the costly use of the Unicode normalization in Werkzeug function secure_filename().

FAME is using this function to sanitize user-provided-input (the name of submitted files). It is possible to slow down (but not crash) the application by submitting a file which has a crafted malicious Unicode name (for instance: filename = '℀' * 1_000_000 ).

The impact is of medium severity (4.3), according to CVSS3. We consider it to be low impact.

The commit 1340418 resolves the issue.

We would like to thanks https://github.com/Sim4n6 for the initial report.

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

CVE ID

No known CVE

Weaknesses

Credits