Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-32763
HistoryJul 20, 2021 - 4:50 p.m.

CVE-2021-32763 Regular Expression Denial of Service in OpenProject forum messages

2021-07-2016:50:10
CWE-400
GitHub_M
www.cve.org
2
openproject
messagescontroller
cve-2021-32763
regular expression
denial of service
forum
messages

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

31.7%

OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the MessagesController class of OpenProject has a quote method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip <pre> tags from the message being quoted. The (.|\s) part can match a space character in two ways, so an unterminated <pre> tag containing n spaces causes Ruby’s regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. The issue is fixed in OpenProject 11.3.3. As a workaround, one may install the patch manually.

CNA Affected

[
  {
    "product": "openproject",
    "vendor": "opf",
    "versions": [
      {
        "status": "affected",
        "version": "< 11.3.3"
      }
    ]
  }
]

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

EPSS

0.001

Percentile

31.7%

Related for CVELIST:CVE-2021-32763