Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XML DoS Attack #192

Closed
prodigysml opened this issue May 29, 2018 · 0 comments
Closed

XML DoS Attack #192

prodigysml opened this issue May 29, 2018 · 0 comments

Comments

@prodigysml
Copy link

The Issue

A specially crafted XML file can be used to create a denial of service scenario within the openpsa admin portal.

Vulnerable Code

$opml_parser = xml_parser_create();
xml_parse_into_struct($opml_parser, $opml_data, $opml_values);

The above code displays that an XML file is being parsed.

if ( array_key_exists('net_nemein_rss_manage_opml', $_FILES)
&& is_uploaded_file($_FILES['net_nemein_rss_manage_opml']['tmp_name'])) {
$opml_file = $_FILES['net_nemein_rss_manage_opml']['tmp_name'];

The code above displays that the XML file is user controlled. This can allow an attacker to create a denial of service scenario for all versions of PHP prior to 5.6.21

Minimum PHP requirements for openpsa project:
http://www.openpsa2.org/resources/installing-openpsa/

CVE for vulnerable PHP function:
https://www.cvedetails.com/cve/CVE-2016-4539/

@flack flack closed this as completed in 4974a26 May 29, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant