-
Notifications
You must be signed in to change notification settings - Fork 248
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New experimental query: Java BigDecimal DOS #435
Comments
@tonghuaroot what is the associated CVE (old or new) for this submission? A CVE-ID is required to submit an All For One bounty query as per: https://securitylab.github.com/bounties/
|
Hi @anticomputer, Thanks for your response. I have found some results. I have submitted them to the owner of the corresponding open source software, but I still haven't applied for CVE. I want to know how I can submit this part of information to you? |
I will try to request CVE and then update this issue, Thanks. |
Hi @tonghuaroot, |
Hi @JarLob, Thanks for your hint, Let me try to find this pattern in historical CVE. |
Hi @tonghuaroot, any update on this? |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
Your submission is now in status Closed. For information, the evaluation workflow is the following: |
Query
Relevant PR: github/codeql#6730
CVE ID(s)
Report
Directly incorporating user input into an BigDecimal Operation Function without validating the input
can facilitate DOS attacks. In these attacks, the server
will consume a lot of computing resources, A typical scenario is that the CPU usage rises to close to 100%.
This issue often occurs in scenarios that require scientific computing, such as e-commerce platforms and electronic payments.
Result(s)
The text was updated successfully, but these errors were encountered: