Hi team,

Every once in a while someone reports the compression bomb risk with curl and --compressed as a vulnerability. We regularly dismiss that as we believe we document this risk and behavior.

Still, the risk is there: if you use --compressed, a tiny download can be decompressed into a HUGE destination file.

The --max-filesize option does not help here because it sets a limit to the size of the downloaded file, and one of these "bombs" does not have to be a big download.

But maybe we can do better?

Would it make sense to have some kind of limit to the "explosion factor" ? Should perhaps the --max-filesize limit be applied on the uncompressed size as well ? Should there be a new separate option? Or should we rather leave things as they are?

--

 / daniel.haxx.se || https://rock-solid.curl.dev
--
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-users
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to