-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Incomplete JSON parsing => security vulnerability #1576
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Dear @marcstern, Regardless of the content, do you really think that it is a good idea to publish a possible security bypass on GitHub ? |
In this case, there is very few information an attacker can use. |
I created a (one line) pull request for this: #1577 |
Remark: In my patch, I used an empty ARG name. This looks the most logical approach; however, in a strict environment, you should have a rule forbidding (for non-JSON requests) an empty ARG name. |
This patch is trivial and has a high value, why not adding it in the 2.9 trunk? |
I think you meant to make this comment on the related pull request, not in this issue. The pull request can be found at #1577. The pull request is under review, it will be merged once the review is done. |
This is already fixed in v3.0. The solution adopted is different from the ticket #1577. In v3 the json parser understands the array structures into array_n format, where "n" is the position of the element. Also, we moved from string concatenation to a stack structure making the implementation more robust. Fix is still pending for v2. |
Thanks @marcstern. |
Uh oh!
There was an error while loading. Please reload this page.
** Content was removed by @zimmerle on 2017-Sep-27
The text was updated successfully, but these errors were encountered: