Lucene search

K
githubGitHub Advisory DatabaseGHSA-XRX9-GJ26-5WX9
HistoryOct 07, 2022 - 7:33 a.m.

v8n vulnerable to Inefficient Regular Expression Complexity

2022-10-0707:33:44
CWE-400
CWE-1333
GitHub Advisory Database
github.com
10
v8n
inefficient regular expression
complexity
dos attack
payload
patch
vulnerability
huntr.dev
regular expression denial of service
catastrophic backtracking
v1.5.1
reference
information security

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.0%

Impact

Inefficient regular expression complexity of lowercase() and uppercase() regex could lead to a denial of service attack. With a formed payload 'a' + 'a'.repeat(i) + 'A', only 32 characters payload could take 29443 ms time execution when testing lowercase(). The same issue happens with uppercase().

Patches

v1.5.1

References

huntr.dev report
Regular Expression Denial of Service (ReDoS) and Catastrophic Backtracking

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
v8n_projectv8nRange<1.5.1node.js
VendorProductVersionCPE
v8n_projectv8n*cpe:2.3:a:v8n_project:v8n:*:*:*:*:*:node.js:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

50.0%

Related for GHSA-XRX9-GJ26-5WX9