CVE-2026-3816

A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended.
Configurations

Configuration 1 (hide)

cpe:2.3:a:owasp:defectdojo:*:*:*:*:*:*:*:*

History

10 Mar 2026, 19:55

Type Values Removed Values Added
CPE cpe:2.3:a:owasp:defectdojo:*:*:*:*:*:*:*:*
First Time Owasp
Owasp defectdojo
Summary
  • (es) Una vulnerabilidad de seguridad ha sido detectada en OWASP DefectDojo hasta 2.55.4. Esta vulnerabilidad afecta a la función input_zip.read del archivo parser.py del componente SonarQubeParser/MSDefenderParser. La manipulación conduce a denegación de servicio. El ataque puede ser iniciado remotamente. El exploit ha sido divulgado públicamente y puede ser utilizado. La actualización a la versión 2.56.0 es capaz de resolver este problema. El identificador del parche es e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Se recomienda actualizar el componente afectado.
References () https://github.com/DefectDojo/django-DefectDojo/commit/e8f1e5131535b8fd80a7b1b3085d676295fdcd41 - () https://github.com/DefectDojo/django-DefectDojo/commit/e8f1e5131535b8fd80a7b1b3085d676295fdcd41 - Patch
References () https://github.com/DefectDojo/django-DefectDojo/pull/14408 - () https://github.com/DefectDojo/django-DefectDojo/pull/14408 - Issue Tracking, Patch
References () https://github.com/DefectDojo/django-DefectDojo/releases/tag/2.56.0 - () https://github.com/DefectDojo/django-DefectDojo/releases/tag/2.56.0 - Release Notes
References () https://github.com/henrrrychau/cve-bug-bounty/blob/main/dfdj_zip_bomb_dos_oom/dfdj_zip_bomb_dos_oom.md - () https://github.com/henrrrychau/cve-bug-bounty/blob/main/dfdj_zip_bomb_dos_oom/dfdj_zip_bomb_dos_oom.md - Exploit, Third Party Advisory
References () https://github.com/henrrrychau/cve-bug-bounty/blob/main/dfdj_zip_bomb_dos_oom/dfdj_zip_bomb_dos_oom.md#supporting-materialreferences - () https://github.com/henrrrychau/cve-bug-bounty/blob/main/dfdj_zip_bomb_dos_oom/dfdj_zip_bomb_dos_oom.md#supporting-materialreferences - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.349782 - () https://vuldb.com/?ctiid.349782 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349782 - () https://vuldb.com/?id.349782 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.769524 - () https://vuldb.com/?submit.769524 - Third Party Advisory, VDB Entry
CWE CWE-1284

09 Mar 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-09 11:16

Updated : 2026-03-10 19:55


NVD link : CVE-2026-3816

Mitre link : CVE-2026-3816

CVE.ORG link : CVE-2026-3816


JSON object : View

Products Affected

owasp

  • defectdojo
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-1284

Improper Validation of Specified Quantity in Input