Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x9w7-f6x8-r9xh

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

User controlled request.getHeader("Referer"), request.getRequestURL() and request.getQueryString() are used to build and run a regex expression. The attacker doesn't have to use a browser and may send a specially crafted Referer header programmatically. Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. This problem has been fixed in Roller 6.0.2.

User controlled request.getHeader("Referer"), request.getRequestURL() and request.getQueryString() are used to build and run a regex expression. The attacker doesn't have to use a browser and may send a specially crafted Referer header programmatically. Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. This problem has been fixed in Roller 6.0.2.

EPSS

Процентиль: 85%
0.02435
Низкий

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

User controlled `request.getHeader("Referer")`, `request.getRequestURL()` and `request.getQueryString()` are used to build and run a regex expression. The attacker doesn't have to use a browser and may send a specially crafted Referer header programmatically. Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. This problem has been fixed in Roller 6.0.2.

EPSS

Процентиль: 85%
0.02435
Низкий

Дефекты

CWE-400