Medium

zipp

Denial of Service via Crafted Zip File

A denial of service vulnerability was discovered in all versions of the zipp and CPython's zipfile modules, leading to an infinite loop when processing a specially crafted zip file. This issue was patched in version 3.19.1.

Available publicly on Jul 09 2024

6.2

CVSS:

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Credit:

0xcrypto
Threat Overview

The vulnerability arises from the way the zipp and CPython's zipfile modules handle zip files with certain directory structures. Specifically, a zip file containing entries with leading slashes can cause functions like joinpath, iterdir, and the overloaded division operator to enter an infinite loop. This can lead to a denial of service as the affected application becomes unresponsive.

Attack Scenario

An attacker could create a malicious zip file with entries that have leading slashes and distribute it to users or systems that utilize the zipp or CPython's zipfile modules. When the victim processes this zip file using affected functions, the application will enter an infinite loop, causing a denial of service.

Who is affected

Any application or user utilizing the zipp or CPython's zipfile modules to process zip files is affected by this vulnerability. This includes developers and systems that rely on these libraries for handling zip archives.

Technical Report
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.