Miggo Logo

GHSA-7c2q-5qmr-v76q: DoS vulnerabilities persist in ESAPI file uploads despite remediation of CVE-2023-24998

7.5

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
10/27/2023
Updated
1/23/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.owasp.esapi:esapimaven< 2.5.2.02.5.2.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly identifies methods in the DefaultHTTPUtilities implementation class (specifically HTTPUtilities.getFileUploads) as the affected components. The vulnerability persists because these methods do not enforce upload restrictions by design, relying instead on client code to implement protections. The ESAPI team acknowledges the risk but refuses to add breaking changes, leaving the core file upload processing functions inherently vulnerable to DoS attacks through uncontrolled uploads.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *S*PI *.*.*.* *n* l*t*r ***r*ss** t** *oS vuln*r**ility **s*ri*** in *V*-****-*****, w*i** *p**** *ommons *il*Uplo** *.* *tt*mpt** to r*m**i*t*. *ut w*il* writin* up * n*w s**urity *ull*tin r***r*in* t** imp**t on t** *****t** *S*PI `*TTP

Reasoning

T** **visory *xpli*itly i**nti*i*s m*t*o*s in t** ****ult*TTPUtiliti*s impl*m*nt*tion *l*ss (sp**i*i**lly `*TTPUtiliti*s.**t*il*Uplo**s`) *s t** *****t** *ompon*nts. T** vuln*r**ility p*rsists ****us* t**s* m*t*o*s *o not *n*or** uplo** r*stri*tions