Learn about CVE-2023-3782: Denial of Service vulnerability in OkHttp client due to Brotli zip-bomb injection. Impact, technical details, and mitigation strategies included.
This CVE record covers a vulnerability that involves a DoS (Denial of Service) issue in the OkHttp client when utilizing a BrotliInterceptor while accessing a malicious web server or when an attacker can conduct a Man-in-the-Middle (MitM) attack to inject a Brotli zip-bomb into an HTTP response.
Understanding CVE-2023-3782
This section provides a detailed insight into CVE-2023-3782, covering its nature, impact, technical details, and mitigation strategies.
What is CVE-2023-3782?
CVE-2023-3782 is a vulnerability that leads to a Denial of Service condition in the OkHttp client. It occurs when the client is using a BrotliInterceptor and interacts with a malicious web server. Additionally, the vulnerability can be exploited by an attacker who performs a Man-in-the-Middle attack to insert a Brotli zip-bomb into an HTTP response.
The Impact of CVE-2023-3782
The impact of this vulnerability is rated as MEDIUM severity. It has a CVSSv3.1 base score of 5.9, with a HIGH availability impact. The vulnerability does not affect confidentiality or integrity but can cause a denial of service for users accessing affected systems.
Technical Details of CVE-2023-3782
This section delves into the technical aspects of CVE-2023-3782, including vulnerability description, affected systems and versions, and exploitation mechanism.
Vulnerability Description
The vulnerability arises from uncontrolled resource consumption, leading to a DoS in the OkHttp client when utilizing a BrotliInterceptor in specific scenarios as described.
Affected Systems and Versions
The vulnerability affects systems using the 'com.squareup.okhttp3:okhttp-brotli' package with version 0 in the Maven repository.
Exploitation Mechanism
The vulnerability can be exploited by attackers by leveraging a Brotli zip-bomb injection through a Man-in-the-Middle attack or by directing users to a malicious web server.
Mitigation and Prevention
To address CVE-2023-3782, organizations and users should take immediate steps, implement long-term security practices, and apply relevant patches and updates.
Immediate Steps to Take
Immediately disable or restrict the usage of the BrotliInterceptor in the OkHttp client to mitigate the risk of exploitation.
Long-Term Security Practices
Enhance network security measures, conduct regular vulnerability assessments, educate users about safe browsing practices, and ensure secure configurations to prevent similar vulnerabilities in the future.
Patching and Updates
Monitor for security updates from the OkHttp library maintainers and promptly apply patches to address CVE-2023-3782 and other potential vulnerabilities.