Uploaded image for project: 'Oozie'
  1. Oozie
  2. OOZIE-3719

Apache Oozie Regex Denial of Service (ReDoS) Vulnerability by Low Privilege Users Disrupting Access for Intended Users

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Patch Available
    • Major
    • Resolution: Unresolved
    • 5.2.1
    • None
    • core
    • None

    Description

       

      Looking further into the code focusing on the action and type query strings.
      We can see that the filter variable is getting its value from the requestsParameters .
      once the Filter parameter is being populated, an If loop checking whether Scope and Type are not Null and next
      the code checks the logRetrievalType is equal to the JOB_LOG_ACTION (which is the action query string).

       

      Next the values of logRetrievalScope gets split by , and entering the the if loop.
      In the block where ranges of actions are processed ( if (s.contains("-")) { ... } ), an attacker could potentially
      send a specially crafted request with a massive range, such as "1-1000000". This would create a for loop
      iterating and adding that many actions to the actionSet , consuming CPU and memory resources.
      Though there is a subsequent check against maxNumActionsForLog , this check only happens after all the iterations,
      allowing an attacker to consume resources before this check is made -

       

       

       

      Attachments

        1. image-2023-09-15-02-47-52-819.png
          384 kB
          Sanjay Kumar Sahu
        2. image-2023-09-15-02-49-14-531.png
          406 kB
          Sanjay Kumar Sahu
        3. image-2023-09-15-02-52-09-320.png
          406 kB
          Sanjay Kumar Sahu
        4. oozie3719.patch
          11 kB
          Sanjay Kumar Sahu
        5. OOZIE-3719-001.patch
          11 kB
          Sanjay Kumar Sahu

        Activity

          People

            SanjayKumarSahu Sanjay Kumar Sahu
            SanjayKumarSahu Sanjay Kumar Sahu
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated: