Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-36568: fix issue #1424 · revel/revel@d160ecb

Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation.

CVE
#js#git

@@ -7,6 +7,7 @@ package revel

import (

“encoding/json”

“fmt”

“github.com/revel/config”

“io”

“io/ioutil”

“os”

@@ -98,6 +99,8 @@ var (

"invalidArr": {"xyz"},

"int8-overflow": {"1024"},

"uint8-overflow": {"1024"},

"arrDoS[2]": {"2"},

"arrDoS[65535]": {"65535"},

}

testDate = time.Date(1982, time.July, 9, 0, 0, 0, 0, time.UTC)

@@ -168,6 +171,7 @@ var binderTestCases = map[string]interface{}{

"priv": A{},

"int8-overflow": int8(0),

"uint8-overflow": uint8(0),

"arrDoS": []int{0, 0, 2},

}

// Types that files may be bound to, and a func that can read the content from

@@ -213,6 +217,12 @@ func TestBinder(t *testing.T) {

// Reuse the mvc_test.go multipart request to test the binder.

params := &Params{}

c := NewTestController(nil, getMultipartRequest())

if Config == nil {

Config = config.NewContext()

defer func() {

Config = nil

}()

}

ParseParams(params, NewRequest(c.Request.In))

params.Values = ParamTestValues

Related news

GHSA-hggr-p7v6-73p5: revel is vulnerable to resource exhaustion

Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda