Skip to content

superagent vulnerable to zip bomb attacks

Moderate severity GitHub Reviewed Published Aug 9, 2018 to the GitHub Advisory Database • Updated Sep 8, 2023

Package

npm superagent (npm)

Affected versions

< 3.7.0

Patched versions

3.7.0

Description

Affected versions of superagent do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a ZIP bomb attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed.

This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition.

Recommendation

Update to version 3.7.0 or later.

References

Published to the GitHub Advisory Database Aug 9, 2018
Reviewed Jun 16, 2020
Last updated Sep 8, 2023

Severity

Moderate
5.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE ID

CVE-2017-16129

GHSA ID

GHSA-8225-6cvr-8pqp

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.