blob: 35e18a86258419efb01af9adbddfda2379aa5af3 [file] [log] [blame]
modules:
- module: github.com/tendermint/tendermint
versions:
- fixed: 0.31.1
packages:
- package: github.com/tendermint/tendermint/rpc/client
symbols:
- makeHTTPClient
description: |
Due to support of Gzip compression in request bodies, as well
as a lack of limiting response body sizes, a malicious server
can cause a client to consume a significant amount of system
resources, which may be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-3fm3-m23v-5r46
credit: '@guagualvcha'
references:
- fix: https://github.com/tendermint/tendermint/pull/3430
- fix: https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613
cve_metadata:
id: CVE-2019-25072
cwe: 'CWE-400: Uncontrolled Resource Consumption'