Lucene search

K
githubGitHub Advisory DatabaseGHSA-MPG4-RC92-VX8V
HistoryJul 29, 2024 - 5:46 p.m.

fast-xml-parser vulnerable to ReDOS at currency parsing

2024-07-2917:46:16
CWE-400
CWE-1333
GitHub Advisory Database
github.com
23
redos
fast-xml-parser
currency parsing
vulnerable
denial of service
regex
gauss security labs
naturalintelligence
experimental version
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

21.9%

Summary

A ReDOS exists on currency.js was discovered by Gauss Security Labs R&D team.

Details

https://github.com/NaturalIntelligence/fast-xml-parser/blob/master/src/v5/valueParsers/currency.js#L10
contains a vulnerable regex

PoC

pass the following string ‘\t’.repeat(13337) + ‘.’

Impact

Denial of service during currency parsing in experimental version 5 of fast-xml-parser-library

https://gauss-security.com

Affected configurations

Vulners
Node
fast-xml-parser_projectfast-xml-parserRange<4.4.1node.js
VendorProductVersionCPE
fast-xml-parser_projectfast-xml-parser*cpe:2.3:a:fast-xml-parser_project:fast-xml-parser:*:*:*:*:*:node.js:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.1

Confidence

High

EPSS

0.001

Percentile

21.9%