Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: phoenixd

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
created 3 hours ago Activity log
  • Created suggestion
Long-poll NDJSON body splitting causes unbounded memory allocation in Phoenix

Allocation of Resources Without Limits or Throttling vulnerability in phoenixframework phoenix allows a denial of service via the long-poll transport's NDJSON body handling. In 'Elixir.Phoenix.Transports.LongPoll':publish/4, when a POST request is received with Content-Type: application/x-ndjson, the request body is split on newline characters using String.split/2 with no limit on the number of resulting segments. An attacker can send a body consisting entirely of newline bytes, causing a 1:1 amplification into a list of empty binaries — a 1 MB body produces approximately one million list elements, an 8 MB body approximately 8.4 million. Each element is then walked by Enum.map, materializing another list of the same size. This exhausts BEAM memory and schedulers, crashing the node and terminating all active sessions. A session token required to reach the vulnerable endpoint is freely obtainable by any client via an unauthenticated GET request to the same URL with a matching Origin header, making this attack effectively unauthenticated. This issue affects phoenix: from 1.7.0 before 1.7.22 and 1.8.6.

Affected products

phoenix
  • <1.7.22
  • <1.8.6
phoenixframework/phoenix
  • *

Matching in nixpkgs

pkgs.phoenixd

Server equivalent of the popular Phoenix wallet for mobile

Package maintainers