Skip to content

Security: Unbounded limit parameter in user search can be abused for resource exhaustion#8476

Open
tomaioo wants to merge 1 commit intonextcloud:mainfrom
tomaioo:fix/security/unbounded-limit-parameter-in-user-search
Open

Security: Unbounded limit parameter in user search can be abused for resource exhaustion#8476
tomaioo wants to merge 1 commit intonextcloud:mainfrom
tomaioo:fix/security/unbounded-limit-parameter-in-user-search

Conversation

@tomaioo
Copy link
Copy Markdown

@tomaioo tomaioo commented Apr 16, 2026

Summary

Security: Unbounded limit parameter in user search can be abused for resource exhaustion

Problem

Severity: Medium | File: lib/Controller/UserApiController.php:L39

The index(string $filter = '', int $limit = 5) method accepts client-controlled limit and passes it directly to collaborator search. Without an upper bound, an attacker can request very large limits, causing expensive directory lookups and increased response size.

Solution

Enforce a strict maximum (e.g., 10-50) for limit before invoking search, and consider server-side rate limiting for this endpoint.

Changes

  • lib/Controller/UserApiController.php (modified)

The `index(string $filter = '', int $limit = 5)` method accepts client-controlled `limit` and passes it directly to collaborator search. Without an upper bound, an attacker can request very large limits, causing expensive directory lookups and increased response size.

Signed-off-by: tomaioo <203048277+tomaioo@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant