Home

Description

A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended.

PUBLISHED Reserved 2026-03-08 | Published 2026-03-09 | Updated 2026-03-09 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
4.0AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C

Problem types

Denial of Service

Product status

2.55.0
affected

2.55.1
affected

2.55.2
affected

2.55.3
affected

2.55.4
affected

2.56.0
unaffected

Timeline

2026-03-08:Advisory disclosed
2026-03-08:VulDB entry created
2026-03-08:VulDB entry last update

Credits

h3nrrrych4u (VulDB User) reporter

References

vuldb.com/?id.349782 (VDB-349782 | OWASP DefectDojo SonarQubeParser/MSDefenderParser parser.py input_zip.read denial of service) vdb-entry technical-description

vuldb.com/?ctiid.349782 (VDB-349782 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.769524 (Submit #769524 | OWASP DefectDojo <= 2.55.4 Denial of Service) third-party-advisory

github.com/...dfdj_zip_bomb_dos_oom/dfdj_zip_bomb_dos_oom.md related

github.com/DefectDojo/django-DefectDojo/pull/14408 issue-tracking patch

github.com/...dfdj_zip_bomb_dos_oom/dfdj_zip_bomb_dos_oom.md exploit

github.com/...ommit/e8f1e5131535b8fd80a7b1b3085d676295fdcd41 patch

github.com/DefectDojo/django-DefectDojo/releases/tag/2.56.0 patch

cve.org (CVE-2026-3816)

nvd.nist.gov (CVE-2026-3816)

Download JSON