Allocation of Resources Without Limits or Throttling Affecting redlib package, versions >=0.35.1 <0.36.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-REDLIB-9680146
  • published9 Apr 2025
  • disclosed20 Mar 2025
  • creditTokarak

Introduced: 20 Mar 2025

NewCVE-2025-30160  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade redlib to version 0.36.0 or higher.

Overview

redlib is an alternative private front-end to Reddit

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in the encoded_restore() function, which is accessible via the restore_preferences form. An attacker can consume excessive memory by supplying a base2048-encoded DEFLATE decompression bomb.

Workaround

This vulnerability can be avoided by taking one of the following measures;

  1. Enforce request size limits

  2. Disable or restrict the /settings/encoded-restore route at the reverse-proxy level

  3. Block senders sending excessively large payloads at this endpoint

CVSS Base Scores

version 4.0
version 3.1