GHSA-fc2v-vcwj-269v

Suggest an improvement
Source
https://github.com/advisories/GHSA-fc2v-vcwj-269v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-fc2v-vcwj-269v/GHSA-fc2v-vcwj-269v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-fc2v-vcwj-269v
Aliases
Published
2025-11-13T00:10:50Z
Modified
2025-11-13T00:27:29.708815Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Bugsink is vulnerable to unauthenticated remote DoS via crafted Brotli input
Details

Impact

In affected versions, brotli "bombs" (highly compressed brotli streams, such as many zeros) can be sent to the server. Since the server will attempt to decompress these streams before applying various maximums, this can lead to exhaustion of the available memory and thus a Denial of Service.

This can be done if the DSN is known, which it is in many common setups (JavaScript, Mobile Apps).

Patches

Patched in Bugsink 2.0.5

Database specific
{
    "severity": "HIGH",
    "nvd_published_at": "2025-11-10T22:15:39Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-770"
    ],
    "github_reviewed_at": "2025-11-13T00:10:50Z"
}
References

Affected packages

PyPI / bugsink

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.5

Affected versions

0.*

0.0.1
0.1.12
0.1.13
0.1.14
0.1.15
0.1.16
0.1.17
0.1.18
0.1.19
0.1.20

1.*

1.0.0
1.0.1
1.1.0
1.1.1
1.1.2
1.2.0
1.3.0
1.4.0
1.4.1
1.4.2
1.4.3
1.5.0
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.6.0
1.6.1
1.6.2
1.6.3
1.6.4
1.7.0
1.7.1
1.7.2
1.7.3
1.7.4
1.7.5
1.7.6

2.*

2.0.0a1
2.0.0
2.0.1
2.0.2
2.0.3
2.0.4