plone.rest vulnerable to Denial of Service when ++api++ is used many times
Description
Published by the National Vulnerability Database
Sep 21, 2023
Published to the GitHub Advisory Database
Sep 21, 2023
Reviewed
Sep 21, 2023
Last updated
Oct 9, 2024
Impact
When the
++api++
traverser is accidentally used multiple times in a url, handling it takes increasingly longer, making the server less responsive.Patches
Patches will be released in
plone.rest
2.0.1 and 3.0.1. Series 1.x is not affected.Workarounds
In your frontend web server (nginx, Apache) you can redirect
/++api++/++api++
to/++api++
.References