Denial of Service via Crafted Zip File
A denial of service vulnerability was discovered in all versions of the zipp and CPython's zipfile modules, leading to an infinite loop when processing a specially crafted zip file. This issue was patched in version 3.19.1.
Available publicly on Jul 09 2024 | Available with Premium on May 31 2024
Threat Overview
The vulnerability arises from the way the zipp and CPython's zipfile modules handle zip files with certain directory structures. Specifically, a zip file containing entries with leading slashes can cause functions like joinpath
, iterdir
, and the overloaded division operator to enter an infinite loop. This can lead to a denial of service as the affected application becomes unresponsive.
Attack Scenario
An attacker could create a malicious zip file with entries that have leading slashes and distribute it to users or systems that utilize the zipp or CPython's zipfile modules. When the victim processes this zip file using affected functions, the application will enter an infinite loop, causing a denial of service.
Who is affected
Any application or user utilizing the zipp or CPython's zipfile modules to process zip files is affected by this vulnerability. This includes developers and systems that rely on these libraries for handling zip archives.
Technical Report
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.