296,663
Total vulnerabilities in the database
Authlib’s JWE zip=DEF
path performs unbounded DEFLATE decompression. A very small ciphertext can expand into tens or hundreds of megabytes on decrypt, allowing an attacker who can supply decryptable tokens to exhaust memory and CPU and cause denial of service.
zip=DEF
(DEFLATE) support.authlib/authlib/jose/rfc7518/jwe_zips.py
, DeflateZipAlgorithm.decompress
calls zlib.decompress(s, -zlib.MAX_WBITS)
without a maximum output limit. This permits unbounded expansion of compressed payloads.authlib/authlib/jose/rfc7516/jwe.py
), when the protected header contains "zip": "DEF"
, the library routes the decrypted ciphertext into the decompress
method and assigns the fully decompressed bytes to the plaintext field before returning it. No streaming limit or quota is applied.zip=DEF
ciphertext that inflates to a very large plaintext during decrypt, spiking RSS and CPU. Repeated requests can starve the process or host.Code references (from this repository version):
authlib/authlib/jose/rfc7518/jwe_zips.py
– DeflateZipAlgorithm.decompress
uses unbounded zlib.decompress
.authlib/authlib/jose/rfc7516/jwe.py
– JWE decode path applies zip_.decompress(msg)
when zip=DEF
is present in the header.Contrast: The joserfc
project guards zip=DEF
decompression with a fixed maximum (256 KB) and raises ExceededSizeError
if output would exceed this limit, preventing the bomb. Authlib lacks such a guard in this codebase snapshot.
Environment: Python 3.10+ inside a venv; Authlib installed editable from this repository so source changes are visible. The PoC script demonstrates both a benign and a compressible-bomb payload and prints wall/CPU time, RSS, and size ratios.
python3 -m venv .venv
.venv/bin/pip install --upgrade pip
.venv/bin/pip install -e .
.venv/bin/python /authlib/jwe_deflate_dos_demo.py --size 50 --max-rss-mb 2048
Sample output (abridged):
LOCAL TEST ONLY – do not send to third-party systems.
Runtime: Python 3.13.6 / Authlib 1.6.4 / zip=DEF via A256GCM
[CASE] normal plaintext=13B ciphertext=117B decompressed=13B wall_s=0.000 cpu_s=0.000 peak_rss_mb=31.0 ratio=0.1
[CASE] malicious plaintext=50MB ciphertext=~4KB decompressed=50MB wall_s=~2.3 cpu_s=~2.2 peak_rss_mb=800+ ratio=12500+
The second case shows the decompression spike: a few KB of ciphertext forces allocation and processing of ~50 MB during decrypt. Repeated requests can quickly exhaust available memory and CPU.
Reproduction notes:
alg=dir
, enc=A256GCM
, header includes { "zip": "DEF" }
."A" * N
).--size
to stress memory; the --max-rss-mb
flag helps avoid destabilizing the host during testing.zip=DEF
tokens.zip=DEF
and where an attacker can submit tokens that will be successfully decrypted (e.g., shared dir
key, token reflection, or compromised/abused issuers).Base vector (typical shared‑secret scenario where the attacker must produce a decryptable token):
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
→ 6.5 (MEDIUM)Rationale:
alg=dir
and shared keys across services.CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
→ 7.5 (HIGH)zip=DEF
for inbound JWEs at the application boundary until a fix is available.zlib.decompress(..., max_length)
via decompressobj().decompress(data, MAX_SIZE)
), returning an error when output exceeds a safe limit.joserfc
’s approach: add a conservative maximum output size (e.g., 256 KB by default) and raise a specific error when exceeded; document a controlled way to raise this ceiling for trusted environments.authlib/authlib/jose/rfc7518/jwe_zips.py
, authlib/authlib/jose/rfc7516/jwe.py