Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWo3YzQtMnhqOC13bTdy
Improper Input Validation in kdcproxy
python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.
Permalink: https://github.com/advisories/GHSA-j7c4-2xj8-wm7rJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWo3YzQtMnhqOC13bTdy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 6 years ago
Updated: 2 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-j7c4-2xj8-wm7r, CVE-2015-5159
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-5159
- https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882
- https://bugzilla.redhat.com/show_bug.cgi?id=1245200
- https://github.com/advisories/GHSA-j7c4-2xj8-wm7r
- https://github.com/pypa/advisory-database/tree/main/vulns/kdcproxy/PYSEC-2018-85.yaml
Blast Radius: 3.6
Affected Packages
pypi:kdcproxy
Dependent packages: 0Dependent repositories: 3
Downloads: 157 last month
Affected Version Ranges: < 0.3.2
Fixed in: 0.3.2
All affected versions: 0.3.1
All unaffected versions: 0.4.1, 0.4.2, 1.0.0