Skip to content

fix: the whois server does not implement any rate li... in whois.py#80031

Open
orbisai0security wants to merge 1 commit intoDigitalPlatDev:mainfrom
orbisai0security:fix-v-002-whois-rate-limiting
Open

fix: the whois server does not implement any rate li... in whois.py#80031
orbisai0security wants to merge 1 commit intoDigitalPlatDev:mainfrom
orbisai0security:fix-v-002-whois-rate-limiting

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix high severity security issue in opensource/whois_server/whois.py.

Vulnerability

Field Value
ID V-002
Severity HIGH
Scanner multi_agent_ai
Rule V-002
File opensource/whois_server/whois.py:1

Description: The WHOIS server does not implement any rate limiting, connection throttling, or per-IP query limits. Every incoming TCP connection and query is processed without restriction. Because each query may trigger DNS lookups or outbound connections to upstream WHOIS servers, the resource cost per request is amplified, making it possible for a single attacker with modest bandwidth to exhaust the server's CPU, memory, file descriptors, or network connections.

Changes

  • opensource/whois_server/whois.py

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant