First published: Thu Jun 07 2018(Updated: )
Affected versions of `superagent` do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a [ZIP bomb](https://en.wikipedia.org/wiki/Zip_bomb) attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed. This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition. ## Recommendation Update to version 3.7.0 or later.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/superagent | <3.7.0 | 3.7.0 |
Superagent Project Superagent | <3.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2017-16129.
The severity of CVE-2017-16129 is high (5.9).
The ZIP bomb attack affects the vulnerable software by exploiting a lack of post-decompression size checking of ZIP compressed HTTP responses. This allows an extremely small ZIP file to become many orders of magnitude larger when decompressed, leading to a denial of service (DoS) condition.
Versions up to but excluding 3.7.0 of the superagent module are affected by CVE-2017-16129.
To fix CVE-2017-16129, update the superagent module to version 3.7.0 or higher.