Skip to content

Latest commit

 

History

History
executable file
·
47 lines (19 loc) · 831 Bytes

pixel_flood.md

File metadata and controls

executable file
·
47 lines (19 loc) · 831 Bytes

Pixel flood attack

Hi,

I tried to upload those two altered images as incoming invoices and it possibly crashe xxx.xxxxxxxxxxxx.xxx by generating error 504: gateway timeout.

  • lottapixel: In the image itself the 260x260 values has been exchanged with 0xfafa x 0xfafa (so 64250x64250 pixels). By loading the 'whole image' into memory, it tries to allocate 4128062500 pixels into memory, flooding the memory and causing DoS.

  • pixel_of_death: A GIF composed of 40k 1x1 images, image size: 1mb, image dimensions: 2048x2048px

Step to reproduce

1/ upload file as incoming 2/ click on the new item to load the image

PoC

{}

Risk

Denial of service.

Remediation

Depends on the image library you use.

See also

https://hackerone.com/reports/390 https://hackerone.com/reports/400

Best regards,

Gwen