Hi,
I found a DOS-Vulnerability in litecart. If an attacker sends random URL's to LiteCart, those URLs (if unique) are saved to the file logs/note_found.log. Unfortunatly this file is fully loaded to RAM if a not existing URL is called.
By sending a large number of invalid request to litecart, the file size can be increased infinite. Then every call to litecart, that has an invalid url takes the full available memory and causes a lot of IO.
Recommendations
The entries should be logged to dababase. An upsert command can be used to create or update the entries in the db.
How can you protect your system, until a bugfix is published?
E.g. create a cron that empties the not_found.log file.
Best Regards
mschop
Hi,
I found a DOS-Vulnerability in litecart. If an attacker sends random URL's to LiteCart, those URLs (if unique) are saved to the file logs/note_found.log. Unfortunatly this file is fully loaded to RAM if a not existing URL is called.
By sending a large number of invalid request to litecart, the file size can be increased infinite. Then every call to litecart, that has an invalid url takes the full available memory and causes a lot of IO.
Recommendations
The entries should be logged to dababase. An upsert command can be used to create or update the entries in the db.
How can you protect your system, until a bugfix is published?
E.g. create a cron that empties the not_found.log file.
Best Regards
mschop