Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3508: Uncontrolled Resource Consumption

0
Medium
VulnerabilityCVE-2024-3508cvecve-2024-3508
Published: Thu Apr 25 2024 (04/25/2024, 17:46:21 UTC)
Source: CVE Database V5

Description

A flaw was found in Bombastic, which allows authenticated users to upload compressed (bzip2 or zstd) SBOMs. The API endpoint verifies the presence of some fields and values in the JSON. To perform this verification, the uploaded file must first be decompressed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:45:47 UTC

Technical Analysis

CVE-2024-3508 identifies an uncontrolled resource consumption vulnerability in Bombastic, a tool that accepts compressed Software Bill of Materials (SBOM) uploads in bzip2 or zstd formats. The vulnerability arises because the API endpoint responsible for verifying the presence of certain JSON fields first decompresses the uploaded file without adequate resource usage controls. Authenticated users can exploit this by uploading specially crafted compressed files that, when decompressed, consume excessive CPU and memory resources, potentially leading to denial of service (DoS) conditions. The flaw is categorized under CWE-434, which involves unrestricted file uploads that can cause harmful effects. The CVSS v3.1 score is 4.3 (medium), reflecting that the attack vector is network-based, requires low complexity, and privileges (authenticated user), but no user interaction is needed. The impact is limited to availability degradation, with no confidentiality or integrity compromise. No patches or known exploits have been reported yet. This vulnerability highlights the risk of insufficient input validation and resource management in file upload and processing functionalities, especially when dealing with compressed data formats that can expand significantly upon decompression.

Potential Impact

The primary impact of CVE-2024-3508 is on the availability of Bombastic services. By exploiting this vulnerability, an authenticated attacker can cause excessive resource consumption during the decompression of uploaded SBOM files, potentially leading to denial of service. This can disrupt software supply chain management processes, delay vulnerability assessments, and impact development pipelines relying on Bombastic. While confidentiality and integrity are not directly affected, the availability impact can have cascading effects on organizational security posture and operational continuity. Organizations with high reliance on automated SBOM processing may experience significant operational disruptions. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with many users or weak access controls.

Mitigation Recommendations

To mitigate CVE-2024-3508, organizations should implement strict controls on the size and type of uploaded SBOM files, including enforcing maximum file size limits before decompression. Resource limits (CPU, memory, and timeouts) should be applied to the decompression process to prevent excessive consumption. Input validation should be enhanced to detect and reject suspicious or malformed compressed files early. Monitoring and alerting on unusual resource usage patterns during file uploads can help detect exploitation attempts. Access controls should be tightened to restrict upload capabilities to trusted users only. If possible, sandboxing the decompression process or offloading it to isolated environments can reduce the risk of service disruption. Regularly updating Bombastic and applying vendor patches once available is critical. Additionally, organizations should review their incident response plans to address potential denial of service scenarios related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-04-09T08:03:26.957Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f698540b920e2708380f3

Added to database: 11/20/2025, 7:18:29 PM

Last enriched: 2/28/2026, 4:45:47 AM

Last updated: 3/24/2026, 10:12:33 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses