Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-34104

Опубликовано: 06 июн. 2023
Источник: redhat
CVSS3: 7.5

Описание

fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the processEntities: false option.

A flaw was found in the fast-XML-parser. The affected versions of fast-XML-parser are vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in the Doctype Entities. By sending a specially crafted regex input, a remote attacker can cause a denial of service condition.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Serverlessorg.kie.kogito-kogito-appsAffected
Red Hat OpenShift Virtualization 4container-native-virtualization/kubevirt-console-pluginAffected
Red Hat OpenShift Virtualization 4container-native-virtualization/kubevirt-console-plugin-rhel9Affected
MTA-6.2-RHEL-9mta/mta-ui-rhel9FixedRHSA-2023:462714.08.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-917
https://bugzilla.redhat.com/show_bug.cgi?id=2221261fast-xml-parser: Regex Injection via Doctype Entities

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.

CVSS3: 7.5
debian
больше 2 лет назад

fast-xml-parser is an open source, pure javascript xml parser. fast-xm ...

CVSS3: 7.5
github
больше 2 лет назад

fast-xml-parser vulnerable to Regex Injection via Doctype Entities

7.5 High

CVSS3