diff --git a/jwcrypto/jwe.py b/jwcrypto/jwe.py index 9412881..fc1a5c2 100644 --- a/jwcrypto/jwe.py +++ b/jwcrypto/jwe.py @@ -10,6 +10,9 @@ from jwcrypto.jwa import JWA from jwcrypto.jwk import JWKSet +# Limit the amout of data we are willing to decompress by default. +default_max_compressed_size = 256 * 1024 + # RFC 7516 - 4.1 # name: (description, supported?) @@ -422,6 +425,10 @@ def _decrypt(self, key, ppe): compress = jh.get('zip', None) if compress == 'DEF': + if len(data) > default_max_compressed_size: + raise InvalidJWEData( + 'Compressed data exceeds maximum allowed' + 'size' + f' ({default_max_compressed_size})') self.plaintext = zlib.decompress(data, -zlib.MAX_WBITS) elif compress is None: self.plaintext = data diff --git a/jwcrypto/tests.py b/jwcrypto/tests.py index bb2ff10..ed233be 100644 --- a/jwcrypto/tests.py +++ b/jwcrypto/tests.py @@ -2110,6 +2110,30 @@ def test_pbes2_hs256_aeskw_custom_params(self): p2cenc.add_recipient(key) jwa.default_max_pbkdf2_iterations += 2 p2cenc.add_recipient(key) + def test_jwe_decompression_max(self): + key = jwk.JWK(kty='oct', k=base64url_encode(b'A' * (128 // 8))) + payload = '{"u": "' + "u" * 400000000 + '", "uu":"' + "u" * 400000000 + '"}' + protected_header = { + "alg": "A128KW", + "enc": "A128GCM", + "typ": "JWE", + "zip": "DEF", + } + enc = jwe.JWE(payload.encode('utf-8'), + recipient=key, + protected=protected_header).serialize(compact=True) + with self.assertRaises(jwe.InvalidJWEData): + check = jwe.JWE() + check.deserialize(enc) + check.decrypt(key) + + defmax = jwe.default_max_compressed_size + jwe.default_max_compressed_size = 1000000000 + # ensure we can eraise the limit and decrypt + check = jwe.JWE() + check.deserialize(enc) + check.decrypt(key) + jwe.default_max_compressed_size = defmax class JWATests(unittest.TestCase):