DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://github.com/square/okhttp/issues/7738 | vendor advisory issue tracking |
https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/ | third party advisory exploit |