<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 07:28:52 +0000</lastBuildDate>
    <item>
      <title>1ae2f47b-8e0a-4e0e-b580-0bf5bf89e18a</title>
      <link>https://vulnerability.circl.lu/sighting/1ae2f47b-8e0a-4e0e-b580-0bf5bf89e18a/export</link>
      <description>{"uuid": "1ae2f47b-8e0a-4e0e-b580-0bf5bf89e18a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-39804", "type": "seen", "source": "https://gist.github.com/alon710/560a262a37ded8b644e3892d54c879bb", "content": "# CVE-2026-39804: CVE-2026-39804: Remote Code Execution and DoS via Bandit WebSocket Permessage-Deflate Resource Exhaustion\n\n&amp;gt; **CVSS Score:** 8.2\n&amp;gt; **Published:** 2026-05-07\n&amp;gt; **Full Report:** https://cvereports.com/reports/CVE-2026-39804\n\n## Summary\nCVE-2026-39804 is a critical resource exhaustion vulnerability (CWE-770) affecting the Bandit Elixir HTTP server. By exploiting unbounded DEFLATE decompression in WebSocket frames, an unauthenticated attacker can crash the Erlang VM (BEAM) via a highly compressed decompression bomb.\n\n## TL;DR\nUnauthenticated remote attackers can trigger a Denial of Service (OOM crash) in the Bandit web server by sending a highly compressed WebSocket frame, exhausting BEAM memory if `permessage-deflate` is enabled.\n\n## Exploit Status: POC\n\n## Technical Details\n\n- **CWE ID**: CWE-770\n- **Attack Vector**: Network (Remote)\n- **CVSS v4.0 Score**: 8.2 (High)\n- **EPSS Score**: 0.0004 (11.83%)\n- **Exploit Status**: Proof-of-Concept Available\n- **Impact**: Denial of Service (Node Crash)\n\n## Affected Systems\n\n- Bandit HTTP Server (mtrudel/bandit)\n- **bandit**: &amp;gt;= 0.5.9, &amp;lt; 1.11.0 (Fixed in: `1.11.0`)\n\n## Mitigation\n\n- Upgrade Bandit server to version 1.11.0 or newer.\n- Disable `permessage-deflate` compression globally by setting `compress: false` in the WebSocket adapter configuration.\n\n**Remediation Steps:**\n1. Update the `mix.exs` dependencies to require `{:bandit, \"&amp;gt;= 1.11.0\"}`.\n2. Run `mix deps.get` and `mix deps.compile` to fetch and build the patched version.\n3. If patching is impossible, review calls to `WebSockAdapter.upgrade/4` and remove any `compress: true` options.\n4. Deploy the updated application and restart the BEAM node.\n5. Verify the remediation by monitoring application memory metrics when under WebSocket load.\n\n## References\n\n- [GHSA-frh3-6pv6-rc8j Advisory](https://github.com/mtrudel/bandit/security/advisories/GHSA-frh3-6pv6-rc8j)\n- [CNA Advisory Entry](https://cna.erlef.org/cves/CVE-2026-39804.html)\n- [OSV Entry](https://osv.dev/vulnerability/EEF-CVE-2026-39804)\n\n\n---\n*Generated by [CVEReports](https://cvereports.com/reports/CVE-2026-39804) - Automated Vulnerability Intelligence*", "creation_timestamp": "2026-05-07T06:10:29.000000Z"}</description>
      <content:encoded>{"uuid": "1ae2f47b-8e0a-4e0e-b580-0bf5bf89e18a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-39804", "type": "seen", "source": "https://gist.github.com/alon710/560a262a37ded8b644e3892d54c879bb", "content": "# CVE-2026-39804: CVE-2026-39804: Remote Code Execution and DoS via Bandit WebSocket Permessage-Deflate Resource Exhaustion\n\n&amp;gt; **CVSS Score:** 8.2\n&amp;gt; **Published:** 2026-05-07\n&amp;gt; **Full Report:** https://cvereports.com/reports/CVE-2026-39804\n\n## Summary\nCVE-2026-39804 is a critical resource exhaustion vulnerability (CWE-770) affecting the Bandit Elixir HTTP server. By exploiting unbounded DEFLATE decompression in WebSocket frames, an unauthenticated attacker can crash the Erlang VM (BEAM) via a highly compressed decompression bomb.\n\n## TL;DR\nUnauthenticated remote attackers can trigger a Denial of Service (OOM crash) in the Bandit web server by sending a highly compressed WebSocket frame, exhausting BEAM memory if `permessage-deflate` is enabled.\n\n## Exploit Status: POC\n\n## Technical Details\n\n- **CWE ID**: CWE-770\n- **Attack Vector**: Network (Remote)\n- **CVSS v4.0 Score**: 8.2 (High)\n- **EPSS Score**: 0.0004 (11.83%)\n- **Exploit Status**: Proof-of-Concept Available\n- **Impact**: Denial of Service (Node Crash)\n\n## Affected Systems\n\n- Bandit HTTP Server (mtrudel/bandit)\n- **bandit**: &amp;gt;= 0.5.9, &amp;lt; 1.11.0 (Fixed in: `1.11.0`)\n\n## Mitigation\n\n- Upgrade Bandit server to version 1.11.0 or newer.\n- Disable `permessage-deflate` compression globally by setting `compress: false` in the WebSocket adapter configuration.\n\n**Remediation Steps:**\n1. Update the `mix.exs` dependencies to require `{:bandit, \"&amp;gt;= 1.11.0\"}`.\n2. Run `mix deps.get` and `mix deps.compile` to fetch and build the patched version.\n3. If patching is impossible, review calls to `WebSockAdapter.upgrade/4` and remove any `compress: true` options.\n4. Deploy the updated application and restart the BEAM node.\n5. Verify the remediation by monitoring application memory metrics when under WebSocket load.\n\n## References\n\n- [GHSA-frh3-6pv6-rc8j Advisory](https://github.com/mtrudel/bandit/security/advisories/GHSA-frh3-6pv6-rc8j)\n- [CNA Advisory Entry](https://cna.erlef.org/cves/CVE-2026-39804.html)\n- [OSV Entry](https://osv.dev/vulnerability/EEF-CVE-2026-39804)\n\n\n---\n*Generated by [CVEReports](https://cvereports.com/reports/CVE-2026-39804) - Automated Vulnerability Intelligence*", "creation_timestamp": "2026-05-07T06:10:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1ae2f47b-8e0a-4e0e-b580-0bf5bf89e18a/export</guid>
      <pubDate>Thu, 07 May 2026 06:10:29 +0000</pubDate>
    </item>
  </channel>
</rss>
