Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3xq5-wjfh-ppjc

Опубликовано: 09 янв. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Luxon Inefficient Regular Expression Complexity vulnerability

Impact

Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks.

This is the same bug as Moment's https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g

Workarounds

Limit the length of the input.

References

There is an excellent writeup of the same issue in Moment: https://github.com/moment/moment/pull/6015#issuecomment-1152961973

Details

DateTime.fromRFC2822("(".repeat(500000)) takes a couple minutes to complete.

Пакеты

Наименование

luxon

npm
Затронутые версииВерсия исправления

>= 1.0.0, < 1.28.1

1.28.1

Наименование

luxon

npm
Затронутые версииВерсия исправления

>= 2.0.0, < 2.5.2

2.5.2

Наименование

luxon

npm
Затронутые версииВерсия исправления

>= 3.0.0, < 3.2.1

3.2.1

EPSS

Процентиль: 73%
0.00792
Низкий

7.5 High

CVSS3

Дефекты

CWE-1333

Связанные уязвимости

CVSS3: 7.5
redhat
около 3 лет назад

Luxon is a library for working with dates and times in JavaScript. On the 1.x branch prior to 1.38.1, the 2.x branch prior to 2.5.2, and the 3.x branch on 3.2.1, Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This issue also appears in Moment as CVE-2022-31129. Versions 1.38.1, 2.5.2, and 3.2.1 contain patches for this issue. As a workaround, limit the length of the input.

CVSS3: 7.5
nvd
около 3 лет назад

Luxon is a library for working with dates and times in JavaScript. On the 1.x branch prior to 1.38.1, the 2.x branch prior to 2.5.2, and the 3.x branch on 3.2.1, Luxon's `DateTime.fromRFC2822() has quadratic (N^2) complexity on some specific inputs. This causes a noticeable slowdown for inputs with lengths above 10k characters. Users providing untrusted data to this method are therefore vulnerable to (Re)DoS attacks. This issue also appears in Moment as CVE-2022-31129. Versions 1.38.1, 2.5.2, and 3.2.1 contain patches for this issue. As a workaround, limit the length of the input.

EPSS

Процентиль: 73%
0.00792
Низкий

7.5 High

CVSS3

Дефекты

CWE-1333