Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-31099
HistoryJun 27, 2022 - 10:10 p.m.

CVE-2022-31099 Uncontrolled Recursion in rulex

2022-06-2722:10:20
CWE-674
GitHub_M
www.cve.org
3
rulex
parser
dos
stack overflow
security concern
update
cve-2022-31099

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

30.7%

rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provided by an untrusted user), and your service becomes unavailable when the process running rulex aborts due to a stack overflow. The crash is fixed in version 0.4.3. Affected users are advised to update to this version. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "rulex",
    "vendor": "rulex-rs",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.4.3"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

30.7%

Related for CVELIST:CVE-2022-31099