Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-22467
HistoryJan 04, 2023 - 9:52 p.m.

CVE-2023-22467 luxon.js inefficient regular expression complexity vulnerability

2023-01-0421:52:14
CWE-1333
GitHub_M
www.cve.org

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.2%

Luxon is a library for working with dates and times in JavaScript. On the 1.x branch prior to 1.38.1, the 2.x branch prior to 2.5.2, and the 3.x branch on 3.2.1, Luxon’s `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This issue also appears in Moment as CVE-2022-31129. Versions 1.38.1, 2.5.2, and 3.2.1 contain patches for this issue. As a workaround, limit the length of the input.

CNA Affected

[
  {
    "vendor": "moment",
    "product": "luxon",
    "versions": [
      {
        "version": ">= 1.0.0, < 1.38.1",
        "status": "affected"
      },
      {
        "version": ">= 2.0.0, < 2.5.2",
        "status": "affected"
      },
      {
        "version": ">= 3.0.0, < 3.2.1",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.2%